VYPR

apk package

chainguard/etcd-fips-3.4

pkg:apk/chainguard/etcd-fips-3.4

Vulnerabilities (28)

  • CVE-2024-24787MedMay 8, 2024
    affected < 3.4.32-r1fixed 3.4.32-r1

    On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.

  • CVE-2023-45288HigApr 4, 2024
    affected < 3.4.31-r3fixed 3.4.31-r3

    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma

  • CVE-2020-15136Aug 6, 2020
    affected < 3.4.36-r1fixed 3.4.36-r1

    In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the di

  • CVE-2020-15114Aug 6, 2020
    affected < 3.4.36-r1fixed 3.4.36-r1

    In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a

  • CVE-2020-15112Aug 5, 2020
    affected < 3.4.36-r1fixed 3.4.36-r1

    In etcd before versions 3.3.23 and 3.4.10, it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go do

  • CVE-2020-15106Aug 5, 2020
    affected < 3.4.36-r1fixed 3.4.36-r1

    In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that

  • CVE-2018-16886Jan 14, 2019
    affected < 3.4.36-r1fixed 3.4.36-r1

    etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid R

  • CVE-2018-1099Apr 3, 2018
    affected < 3.4.36-r1fixed 3.4.36-r1

    DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address).

Page 2 of 2