rhsa-2021_1407
Vulnerability from csaf_redhat
Published
2021-04-27 16:22
Modified
2024-11-05 23:30
Summary
Red Hat Security Advisory: etcd security update
Notes
Topic
An update for etcd is now available for Red Hat Enterprise Linux 7 Extras.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The etcd packages provide a highly available key-value store for shared configuration.
Security Fix(es):
* etcd: Large slice causes panic in decodeRecord method (CVE-2020-15106)
* etcd: DoS in wal/wal.go (CVE-2020-15112)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for etcd is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The etcd packages provide a highly available key-value store for shared configuration.\n\nSecurity Fix(es):\n\n* etcd: Large slice causes panic in decodeRecord method (CVE-2020-15106)\n\n* etcd: DoS in wal/wal.go (CVE-2020-15112)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1407", "url": "https://access.redhat.com/errata/RHSA-2021:1407" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1407.json" } ], "title": "Red Hat Security Advisory: etcd security update", "tracking": { "current_release_date": "2024-11-05T23:30:44+00:00", "generator": { "date": "2024-11-05T23:30:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:1407", "initial_release_date": "2021-04-27T16:22:12+00:00", "revision_history": [ { "date": "2021-04-27T16:22:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-27T16:22:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T23:30:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.2.32-1.el7_9.src", "product": { "name": "etcd-0:3.2.32-1.el7_9.src", "product_id": "etcd-0:3.2.32-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.2.32-1.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.2.32-1.el7_9.x86_64", "product": { "name": "etcd-0:3.2.32-1.el7_9.x86_64", "product_id": "etcd-0:3.2.32-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.2.32-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.2.32-1.el7_9.x86_64", "product": { "name": "etcd-debuginfo-0:3.2.32-1.el7_9.x86_64", "product_id": "etcd-debuginfo-0:3.2.32-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.2.32-1.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.2.32-1.el7_9.s390x", "product": { "name": "etcd-0:3.2.32-1.el7_9.s390x", "product_id": "etcd-0:3.2.32-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.2.32-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "product": { "name": "etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "product_id": "etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.2.32-1.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.2.32-1.el7_9.ppc64le", "product": { "name": "etcd-0:3.2.32-1.el7_9.ppc64le", "product_id": "etcd-0:3.2.32-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.2.32-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "product": { "name": "etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "product_id": "etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.2.32-1.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.2.32-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.ppc64le" }, "product_reference": "etcd-0:3.2.32-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.2.32-1.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.s390x" }, "product_reference": "etcd-0:3.2.32-1.el7_9.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.2.32-1.el7_9.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.src" }, "product_reference": "etcd-0:3.2.32-1.el7_9.src", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.2.32-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.x86_64" }, "product_reference": "etcd-0:3.2.32-1.el7_9.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le" }, "product_reference": "etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.2.32-1.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.s390x" }, "product_reference": "etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.2.32-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.x86_64" }, "product_reference": "etcd-debuginfo-0:3.2.32-1.el7_9.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15106", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868883" } ], "notes": [ { "category": "description", "text": "A flaw was found In etcd, where a large slice causes panic in the decodeRecord method. The size of a record is stored in the length field of a WAL file, and no additional validation is performed on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: Large slice causes panic in decodeRecord method", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only.\n* In Red Hat OpenStack Platform (RHOSP), the use of etcd is limited to the internal API network, which is not accessible to OpenStack tenants.\n\nThe security impact for these products is therefore rated as Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.src", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.x86_64", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15106" }, { "category": "external", "summary": "RHBZ#1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15106", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T16:22:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.src", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.x86_64", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.src", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.x86_64", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "etcd: Large slice causes panic in decodeRecord method" }, { "cve": "CVE-2020-15112", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868872" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where it is possible to have an entry index greater than the number of entries in the ReadAll method in wal/wal.go. This can cause issues when WAL entries are being read during consensus, as an arbitrary etcd consensus participant can go down from a runtime panic when reading the entry. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: DoS in wal/wal.go", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact of this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.src", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.x86_64", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15112" }, { "category": "external", "summary": "RHBZ#1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T16:22:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.src", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.x86_64", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.src", "7Server-EXTRAS-7.9:etcd-0:3.2.32-1.el7_9.x86_64", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.ppc64le", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.s390x", "7Server-EXTRAS-7.9:etcd-debuginfo-0:3.2.32-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "etcd: DoS in wal/wal.go" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.