CVE-2020-15114

NameCVE-2020-15114
DescriptionIn etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs968740

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
etcd (PTS)buster (security), buster, buster (lts)3.2.26+dfsg-3+deb10u1vulnerable
bullseye3.3.25+dfsg-6fixed
bookworm3.4.23-4fixed
sid, trixie3.5.16-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
etcdsourceexperimental3.3.25+dfsg-1
etcdsource(unstable)3.3.25+dfsg-5968740

Notes

[buster] - etcd <no-dsa> (Minor issue)
https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224

Search for package or bug name: Reporting problems