First published: Mon Jun 08 2020(Updated: )
An information-disclosure flaw was found in the way that gluster-block before 0.5.1 logs the output from gluster-block CLI operations. This includes recording passwords to the cmd_history.log file which is world-readable. This flaw allows local users to obtain sensitive information by reading the log file. The highest threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gluster-block | <0.5.1 | 0.5.1 |
redhat/heketi | <0:9.0.0-9.5.el7 | 0:9.0.0-9.5.el7 |
redhat/gluster-block | <0:0.2.1-36.2.el7 | 0:0.2.1-36.2.el7 |
redhat/tcmu-runner | <0:1.2.0-32.2.el7 | 0:1.2.0-32.2.el7 |
Redhat Gluster-block | <0.5.1 |
Manually change the log files permission to remove readable bits for others, e.g; # chmod 640 /var/log/glusterfs/gluster-block/cmd_history.log NOTE: The above mitigation only restricts access to the other local users. To avoid storing passwords to the log file, kindly update gluster-block to the fixed version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.