Bugzilla – Bug 1178905
VUL-1: CVE-2020-25678: ceph: ceph-dashboard: mgr modules' passwords are in clear text in mgr logs
Last modified: 2021-11-23 18:41:12 UTC
upstream tracker: https://tracker.ceph.com/issues/37503
> We have assigned it CVE-2020-25678 at Red Hat, and currently have it > under embargo, but plan on lifting it on Monday, Nov. 23rd since it is > public already. Wait! It's public already *and* it's under embargo? What's the point of that? This issue has been around for years, and it's been public the whole time. It has obviously not been a high priority in the past, so why is it suddenly high priority now?
In short, I think we can safely sit back and wait for Red Hat to fix it, since it looks like they are now sufficiently motivated to do so.
i remove the embargoed tag, but will keep the bug still closed to suse employees for now.
upstream takes care of this right now. I agree I think we can lean back here.
There is an open draft PR for the dashboard upstream: https://github.com/ceph/ceph/pull/38284
SUSE-SU-2021:1108-1: An update that solves two vulnerabilities and has 12 fixes is now available. Category: security (moderate) Bug References: 1172926,1176390,1176489,1176679,1176828,1177360,1177857,1178837,1178860,1178905,1178932,1179569,1179997,1182766 CVE References: CVE-2020-25678,CVE-2020-27839 JIRA References: Sources used: SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): ceph-15.2.9.83+g4275378de0-3.17.1 SUSE Enterprise Storage 7 (src): ceph-15.2.9.83+g4275378de0-3.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:0544-1: An update that solves two vulnerabilities and has 12 fixes is now available. Category: security (moderate) Bug References: 1172926,1176390,1176489,1176679,1176828,1177360,1177857,1178837,1178860,1178905,1178932,1179569,1179997,1182766 CVE References: CVE-2020-25678,CVE-2020-27839 JIRA References: Sources used: openSUSE Leap 15.2 (src): ceph-15.2.9.83+g4275378de0-lp152.2.12.1, ceph-test-15.2.9.83+g4275378de0-lp152.2.12.1
SUSE-SU-2021:1473-1: An update that solves three vulnerabilities and has 10 fixes is now available. Category: security (important) Bug References: 1145463,1174466,1177200,1178235,1178837,1178860,1178905,1179997,1180118,1180594,1181378,1183074,1183487 CVE References: CVE-2020-25678,CVE-2020-27839,CVE-2021-20288 JIRA References: Sources used: SUSE Manager Server 4.0 (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 SUSE Manager Retail Branch Server 4.0 (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 SUSE Manager Proxy 4.0 (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 SUSE Enterprise Storage 6 (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 SUSE CaaS Platform 4.0 (src): ceph-14.2.20.402+g6aa76c6815-3.60.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:1472-1: An update that solves three vulnerabilities and has 16 fixes is now available. Category: security (important) Bug References: 1145463,1174466,1177200,1178016,1178216,1178235,1178657,1178837,1178860,1178905,1179997,1180118,1180594,1181183,1181378,1181665,1183074,1183487,1183600 CVE References: CVE-2020-25678,CVE-2020-27839,CVE-2021-20288 JIRA References: Sources used: SUSE Enterprise Storage 6 (src): deepsea-0.9.35+git.0.5a1dc9fe-3.34.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done