Search for packages
| purl | pkg:deb/debian/etcd@3.4.23-4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-my73-sc8s-3faj
Aliases: CVE-2023-32082 GHSA-3p4g-rcw5-8298 |
etcd Key name can be accessed via LeaseTimeToLive API ### Impact LeaseTimeToLive API allows access to key names (not value) associated to a lease when `Keys` parameter is true, even a user doesn't have read permission to the keys. The impact is limited to a cluster which enables auth (RBAC). ### Patches < v3.4.26 and < v3.5.9 are affected. ### Workarounds No. ### Reporter Yoni Rozenshein |
Affected by 0 other vulnerabilities. |
|
VCID-pb9m-ts3k-uban
Aliases: CVE-2021-28235 GHSA-gmph-wf7j-9gcm |
Etcd-io Improper Authentication vulnerability Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function. This has been fixed in v.[3.5.8](https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#etcd-server) and was also backported to [3.4](https://github.com/etcd-io/etcd/pull/15655) and [3.5](https://github.com/etcd-io/etcd/pull/15653). |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-7565-6bvk-mqgx | DNS Rebinding in etcd DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address). |
CVE-2018-1099
GHSA-wf43-55jj-vwq8 |
| VCID-ud4m-y2s3-nban | etcd Cross-site Request Forgery (CSRF) A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send. |
CVE-2018-1098
GHSA-5gjm-fj42-x983 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T12:53:54.482073+00:00 | Debian Importer | Fixing | VCID-7565-6bvk-mqgx | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-16T12:03:47.919888+00:00 | Debian Importer | Affected by | VCID-my73-sc8s-3faj | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-16T10:37:32.744064+00:00 | Debian Importer | Affected by | VCID-pb9m-ts3k-uban | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-16T09:52:06.528957+00:00 | Debian Importer | Fixing | VCID-ud4m-y2s3-nban | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-13T08:51:19.931300+00:00 | Debian Importer | Fixing | VCID-7565-6bvk-mqgx | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-13T08:14:35.045787+00:00 | Debian Importer | Affected by | VCID-my73-sc8s-3faj | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-13T07:10:54.332537+00:00 | Debian Importer | Affected by | VCID-pb9m-ts3k-uban | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-13T06:35:56.459708+00:00 | Debian Importer | Fixing | VCID-ud4m-y2s3-nban | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-02T17:16:31.968854+00:00 | Debian Importer | Fixing | VCID-7565-6bvk-mqgx | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-02T17:13:38.000801+00:00 | Debian Importer | Affected by | VCID-my73-sc8s-3faj | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-02T17:08:49.867083+00:00 | Debian Importer | Affected by | VCID-pb9m-ts3k-uban | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-02T17:06:12.381681+00:00 | Debian Importer | Fixing | VCID-ud4m-y2s3-nban | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |