etcd vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the etcd package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use of Uninitialized Variable

*
  • M
Use of Uninitialized Variable

*
  • M
Use of Uninitialized Variable

*
  • M
Use of Uninitialized Variable

*
  • H
Uncontrolled Recursion

*
  • M
Uncontrolled Recursion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • H
Uncontrolled Recursion

<0:3.3.23-17.el8ost
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Misinterpretation of Input

*
  • M
Misinterpretation of Input

*
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • H
Allocation of Resources Without Limits or Throttling

<0:3.3.23-16.el8ost
  • H
CVE-2023-39321

<0:3.3.23-16.el8ost
  • H
Cross-site Scripting (XSS)

<0:3.3.23-16.el8ost
  • H
Cross-site Scripting (XSS)

<0:3.3.23-16.el8ost
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Resource Exhaustion

<0:3.4.26-8.el9ost
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • H
Resource Exhaustion

<0:3.4.26-8.el9ost
  • H
Memory Leak

*
  • H
Memory Leak

<0:3.3.23-16.el8ost
  • H
Memory Leak

<0:3.4.26-8.el9ost
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Arbitrary Code Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Arbitrary Code Injection

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Resource Exhaustion

<0:3.3.23-16.el8ost
  • M
Information Exposure

*
  • H
Information Exposure

<0:3.4.26-8.el9ost
  • H
Resource Exhaustion

<0:3.4.26-8.el9ost
  • H
Resource Exhaustion

<0:3.3.23-15.el8ost
  • H
Resource Exhaustion

<0:3.3.23-15.el8ost
  • H
Resource Exhaustion

<0:3.4.26-3.el9ost
  • H
Resource Exhaustion

<0:3.4.26-3.el9ost
  • H
Resource Exhaustion

<0:3.3.23-15.el8ost
  • H
Resource Exhaustion

<0:3.3.23-15.el8ost
  • H
CVE-2023-39321

<0:3.3.23-16.el8ost
  • H
Cross-site Scripting (XSS)

<0:3.3.23-16.el8ost
  • H
Allocation of Resources Without Limits or Throttling

<0:3.3.23-16.el8ost
  • H
Cross-site Scripting (XSS)

<0:3.3.23-16.el8ost
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Resource Exhaustion

<0:3.4.26-3.el9ost
  • H
Resource Exhaustion

<0:3.3.23-15.el8ost
  • H
HTTP Response Splitting

<0:3.3.23-15.el8ost
  • L
Information Exposure

*
  • L
Information Exposure

*
  • H
Information Exposure

<0:3.4.26-1.el9ost
  • H
Improper Handling of Unicode Encoding

<0:3.3.23-14.el8ost
  • H
Improper Handling of Unicode Encoding

<0:3.3.23-14.el8ost
  • H
Improper Handling of Unicode Encoding

<0:3.3.23-14.el8ost
  • H
Improper Authentication

<0:3.3.23-14.el8ost
  • H
Improper Authentication

<0:3.3.23-14.el8ost
  • H
Improper Authentication

<0:3.4.26-1.el9ost
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.23-14.el8ost
  • H
Resource Exhaustion

<0:3.3.23-14.el8ost
  • H
Arbitrary Code Injection

<0:3.3.23-14.el8ost
  • H
Resource Exhaustion

<0:3.3.23-14.el8ost
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • M
Improper Authentication

<0:3.3.23-1.el8ost
  • L
Authentication Bypass by Primary Weakness

*
  • M
Authentication Bypass by Primary Weakness

<0:3.3.23-1.el8ost
  • L
Authentication Bypass by Primary Weakness

*
  • M
Resource Exhaustion

<0:3.3.23-1.el8ost
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Improper Authorization

*
  • M
Improper Authorization

<0:3.3.23-1.el8ost
  • L
Improper Authorization

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

<0:3.3.23-1.el8ost
  • M
Resource Exhaustion

<0:3.3.23-1.el8ost
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • H
Resource Exhaustion

<0:3.3.23-14.el8ost
  • H
Resource Exhaustion

<0:3.3.23-14.el8ost
  • H
Resource Exhaustion

<0:3.3.23-14.el8ost
  • H
Resource Exhaustion

<0:3.3.23-14.el8ost
  • H
Resource Exhaustion

<0:3.3.23-12.el8ost
  • H
Resource Exhaustion

<0:3.4.14-3.el9ost
  • H
Resource Exhaustion

<0:3.3.23-12.el8ost
  • H
Allocation of Resources Without Limits or Throttling

<0:3.3.23-12.el8ost
  • H
Allocation of Resources Without Limits or Throttling

<0:3.3.23-12.el8ost
  • H
CVE-2022-41715

<0:3.3.23-12.el8ost
  • H
CVE-2022-41715

<0:3.3.23-12.el8ost
  • H
HTTP Request Smuggling

<0:3.3.23-12.el8ost
  • H
HTTP Request Smuggling

<0:3.3.23-12.el8ost
  • H
Resource Exhaustion

<0:3.3.23-12.el8ost
  • H
Resource Exhaustion

<0:3.3.23-12.el8ost
  • H
Resource Exhaustion

<0:3.3.23-12.el8ost
  • H
Resource Exhaustion

<0:3.3.23-12.el8ost
  • H
Information Exposure

<0:3.3.23-12.el8ost
  • H
Information Exposure

<0:3.3.23-12.el8ost
  • H
Improperly Controlled Sequential Memory Allocation

<0:3.3.23-12.el8ost
  • H
Improperly Controlled Sequential Memory Allocation

<0:3.3.23-12.el8ost
  • H
Improperly Controlled Sequential Memory Allocation

<0:3.3.23-12.el8ost
  • H
Improperly Controlled Sequential Memory Allocation

<0:3.3.23-12.el8ost
  • H
Improperly Controlled Sequential Memory Allocation

<0:3.3.23-10.el8ost
  • H
Improperly Controlled Sequential Memory Allocation

<0:3.3.23-10.el8ost
  • H
Improperly Controlled Sequential Memory Allocation

<0:3.3.23-12.el8ost
  • H
Improperly Controlled Sequential Memory Allocation

<0:3.3.23-12.el8ost
  • H
HTTP Request Smuggling

<0:3.3.23-12.el8ost
  • H
HTTP Request Smuggling

<0:3.3.23-12.el8ost
  • H
Insufficient Entropy

<0:3.3.23-12.el8ost
  • H
Insufficient Entropy

<0:3.3.23-12.el8ost
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • H
Missing Release of Resource after Effective Lifetime

<0:3.3.23-10.el8ost
  • H
Missing Release of Resource after Effective Lifetime

<0:3.3.23-10.el8ost
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Unchecked Return Value

*
  • M
Unchecked Return Value

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Resource Exhaustion

<0:3.3.23-7.el8ost
  • H
Resource Exhaustion

<0:3.3.23-7.el8ost
  • M
Race Condition

*
  • M
Race Condition

*
  • H
Improper Input Validation

<0:3.3.23-7.el8ost
  • H
Improper Input Validation

<0:3.3.23-7.el8ost
  • M
Resource Exhaustion

<0:3.3.23-3.1.el8ost.1
  • M
Resource Exhaustion

<0:3.3.23-3.1.el8ost.1
  • M
Improper Input Validation

<0:3.3.23-3.1.el8ost.1
  • M
Improper Input Validation

<0:3.3.23-3.1.el8ost.1
  • M
Improper Input Validation

<0:3.3.23-3.1.el8ost.1
  • M
Improper Input Validation

<0:3.3.23-3.1.el8ost.1
  • H
Improper Input Validation

<0:3.3.23-7.el8ost
  • H
Improper Input Validation

<0:3.3.23-7.el8ost
  • M
Improper Input Validation

<0:3.3.23-3.1.el8ost.1
  • M
Improper Input Validation

<0:3.3.23-3.1.el8ost.1