CVE-2020-15114

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15114
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15114.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15114
Aliases
Related
Published
2020-08-06T23:15:11Z
Modified
2024-09-11T06:12:23.690966Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway.

References

Affected packages

Debian:11 / etcd

Package

Name
etcd
Purl
pkg:deb/debian/etcd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.25+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / etcd

Package

Name
etcd
Purl
pkg:deb/debian/etcd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.25+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / etcd

Package

Name
etcd
Purl
pkg:deb/debian/etcd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.25+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}