github.com/etcd-io/etcd is vulnerable to privilege escalation. The vulnerability exists as it uses Common Name (CN) in the etcd client server TLS certificate to authenticate user with any valid certificate to the gRPC-gateway.
www.securityfocus.com/bid/106540
access.redhat.com/errata/RHSA-2019:0237
access.redhat.com/errata/RHSA-2019:1352
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886
github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.2.md#security-authentication
github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.3.md#security-authentication
lists.fedoraproject.org/archives/list/[email protected]/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/
lists.fedoraproject.org/archives/list/[email protected]/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/