Bug 2024788 (CVE-2021-3979)

Summary: CVE-2021-3979 ceph: Ceph volume does not honour osd_dmcrypt_key_size
Product: [Other] Security Response Reporter: Sage McTaggart <amctagga>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adeza, amctagga, anharris, bniver, branto, danmick, david, dbecker, fedora, flucifre, gfidente, gmeno, hvyas, i, jdurgin, jjoyce, josef, jschluet, kkeithle, lhh, loic, lpeer, madam, mbenjamin, mburns, mhackett, mhicks, muagarwa, ocs-bugs, psampaio, ramkrsna, rcyriac, sclewis, security-response-team, sheggodu, slinaber, sostapov, steve, vereddy
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-05-05 13:16:09 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2027839, 2027840, 2027841, 2039522    
Bug Blocks: 2018529, 2025828    

Description Sage McTaggart 2021-11-19 02:29:50 UTC
The key length for encrypted devices created using ceph-volume is incorrect. This is due to a bug in ceph_volume/util/encryption.py, where upon writing a key using osd_dmcrypt_key_size it does not pass the key size to the format and open operations following. The default key is them applied in cryptsetup. All versions since Luminous are assumed affected.

Comment 4 Sage McTaggart 2021-11-30 20:53:14 UTC
*** Bug 2018529 has been marked as a duplicate of this bug. ***

Comment 5 Sage McTaggart 2021-12-02 20:31:13 UTC
*** Bug 2027837 has been marked as a duplicate of this bug. ***

Comment 6 Sage McTaggart 2022-01-11 21:12:51 UTC
Created ceph tracking bugs for this issue:

Affects: fedora-all [bug 2039522]

Comment 7 errata-xmlrpc 2022-04-04 10:19:45 UTC
This issue has been addressed in the following products:

  Red Hat Ceph Storage 5.1

Via RHSA-2022:1174 https://access.redhat.com/errata/RHSA-2022:1174

Comment 8 errata-xmlrpc 2022-05-05 07:53:13 UTC
This issue has been addressed in the following products:

  Red Hat Ceph Storage 4.3

Via RHSA-2022:1716 https://access.redhat.com/errata/RHSA-2022:1716

Comment 9 Product Security DevOps Team 2022-05-05 13:16:07 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3979

Comment 10 Fedora Update System 2022-11-10 22:21:55 UTC
FEDORA-2022-d832fd2f45 has been pushed to the Fedora 37 stable repository.
If problem still persists, please make note of it in this bug report.