VYPR

apk package

chainguard/etcd-3.4

pkg:apk/chainguard/etcd-3.4

Vulnerabilities (27)

  • CVE-2024-24786HigMar 5, 2024
    affected < 3.4.30-r1fixed 3.4.30-r1

    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.

  • CVE-2020-15136Aug 6, 2020
    affected < 3.4.36-r1fixed 3.4.36-r1

    In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the di

  • CVE-2020-15114Aug 6, 2020
    affected < 3.4.36-r1fixed 3.4.36-r1

    In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a

  • CVE-2020-15112Aug 5, 2020
    affected < 3.4.36-r1fixed 3.4.36-r1

    In etcd before versions 3.3.23 and 3.4.10, it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go do

  • CVE-2020-15106Aug 5, 2020
    affected < 3.4.36-r1fixed 3.4.36-r1

    In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that

  • CVE-2018-16886Jan 14, 2019
    affected < 3.4.36-r1fixed 3.4.36-r1

    etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid R

  • CVE-2018-1099Apr 3, 2018
    affected < 3.4.36-r1fixed 3.4.36-r1

    DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address).

Page 2 of 2