Improper Input Validation Affecting github.com/etcd-io/etcd/wal package, versions <3.4.10
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.07% (27th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMETCDIOETCDWAL-597475
- published 6 Aug 2020
- disclosed 6 Aug 2020
- credit Unknown
Introduced: 6 Aug 2020
CVE-2020-15112 Open this link in a new tabHow to fix?
Upgrade github.com/etcd-io/etcd/wal
to version 3.4.10 or higher.
Overview
Affected versions of this package are vulnerable to Improper Input Validation. It is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go
. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go down from a runtime panic when reading the entry.