Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106528 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2538 | |
https://access.redhat.com/errata/RHSA-2019:2541 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889 | Exploit Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/4035-1/ |
Configurations
History
13 Feb 2023, 04:52
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable. | |
CWE | CWE-312 CWE-200 |
CWE-532 |
02 Feb 2023, 16:18
Type | Values Removed | Values Added |
---|---|---|
Summary | It was found that Ceph RGW did not properly sanitize encryption keys in debug logging for v4 auth. Encryption keys could be inadvertently disclosed when sharing debug logs. | |
References |
|
Information
Published : 2019-01-28 14:29
Updated : 2023-12-10 12:44
NVD link : CVE-2018-16889
Mitre link : CVE-2018-16889
CVE.ORG link : CVE-2018-16889
JSON object : View
Products Affected
redhat
- ceph