First published: Fri Jan 11 2019(Updated: )
Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Upstream Patch: <a href="https://github.com/ceph/ceph/pull/25881/commits">https://github.com/ceph/ceph/pull/25881/commits</a> Upstream Bug: <a href="http://tracker.ceph.com/issues/37847">http://tracker.ceph.com/issues/37847</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ceph |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1665334 is considered high due to the potential exposure of sensitive encryption key information in log files.
To fix REDHAT-BUG-1665334, apply the available patch as outlined in the upstream commit.
REDHAT-BUG-1665334 affects all versions of Ceph that do not implement the patch addressing the issue.
The implications of REDHAT-BUG-1665334 for security include the risk of unauthorized access to encryption keys which can compromise data confidentiality.
Currently, there are no documented workarounds for REDHAT-BUG-1665334; applying the patch is recommended.