Name | CVE-2020-28053 |
Description | HashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration. Fixed in 1.6.10, 1.7.10, and 1.8.6. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 975584 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
consul (PTS) | buster | 1.0.7~dfsg1-5 | fixed |
| bullseye | 1.8.7+dfsg1-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
consul | source | buster | (not affected) | | | |
consul | source | (unstable) | 1.8.6+dfsg1-1 | | | 975584 |
Notes
[buster] - consul <not-affected> (Vulnerable code introduced later)
https://github.com/hashicorp/consul/issues/9240
https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#186-november-19-2020