CVE-2020-28053

NameCVE-2020-28053
DescriptionHashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration. Fixed in 1.6.10, 1.7.10, and 1.8.6.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs975584

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
consul (PTS)buster1.0.7~dfsg1-5fixed
bullseye1.8.6+dfsg1-1fixed
sid1.8.7+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
consulsourcebuster(not affected)
consulsource(unstable)1.8.6+dfsg1-1975584

Notes

[buster] - consul <not-affected> (Vulnerable code introduced later)
https://github.com/hashicorp/consul/issues/9240
https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#186-november-19-2020

Search for package or bug name: Reporting problems