USN-5628-2: etcd vulnerabilities
22 September 2022
Several security issues were fixed in etcd.
Releases
Packages
- etcd - Transitional package for etcd-client and etcd-server
Details
USN-5628-1 fixed vulnerabilities in etcd.
This update provides the corresponding updates for Ubuntu 18.04 ESM.
Original advisory details:
It was discovered that etcd incorrectly handled certain specially crafted
WAL files. An attacker could possibly use this issue to cause a denial of
service. (CVE-2020-15106, CVE-2020-15112)
It was discovered that etcd incorrectly handled directory permissions when
trying to create a directory that exists already. An attacker could
possibly use this issue to obtain sensitive information. (CVE-2020-15113)
It was discovered that etcd incorrectly handled endpoint setup. An
attacker could possibly use this issue to cause a denial of
service. (CVE-2020-15114)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
etcd-server
-
3.2.17+dfsg-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
etcd-client
-
3.2.17+dfsg-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
etcd
-
3.2.17+dfsg-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5628-1: etcd-server, golang-etcd-server-dev, etcd-client, etcd