Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. go.etcd.io/etcd/client/pkg/v3
  4. ›
  5. GHSA-5x4g-q5rc-36jp

GHSA-5x4g-q5rc-36jp: Etcd pkg Insecure ciphers are allowed by default

February 3, 2024 (updated July 8, 2024)

Vulnerability type

Cryptography

Detail

The TLS ciphers list supported by etcd contains insecure cipher suites. Users can configure the desired ciphers using the “–cipher-suites” flag, and a default list of secure cipher suites is used if empty.

Workarounds

By default, no action is required. If users want to specify cipher suites using the ‘–cipher-suites’ flag, they should try not to specify insecure cipher suites. Please refer to the security documentation.

References

Find out more on this vulnerability in the security audit report

References

  • github.com/advisories/GHSA-5x4g-q5rc-36jp
  • github.com/etcd-io/etcd
  • github.com/etcd-io/etcd/security/advisories/GHSA-5x4g-q5rc-36jp

Code Behaviors & Features

Detect and mitigate GHSA-5x4g-q5rc-36jp with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.3.23, all versions starting from 3.4.0-rc.0 before 3.4.10

Fixed versions

  • 3.4.10
  • 3.3.23

Solution

Upgrade to versions 3.3.23, 3.4.10 or above.

Source file

go/go.etcd.io/etcd/client/pkg/v3/GHSA-5x4g-q5rc-36jp.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 13 May 2025 00:14:45 +0000.