Bug 2027837

Summary: ceph: Ceph volume does not honour osd_dmcrypt_key_size
Product: [Other] Security Response Reporter: Sage McTaggart <amctagga>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adeza, amctagga, anharris, bniver, branto, danmick, david, fedora, flucifre, gmeno, hvyas, i, josef, kkeithle, loic, madam, mbenjamin, mhackett, muagarwa, ocs-bugs, ramkrsna, security-response-team, sostapov, steve, vereddy
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A Key Length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-12-02 20:31:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2027839, 2027840, 2027841    
Bug Blocks: 2018529    

Description Sage McTaggart 2021-11-30 20:38:57 UTC
Upon running 'cryptsetup luksDump' on encrypted devices created with ceph-volume, it was noticed that the key length is inaccurate. This is due to a bug in ceph_volume/util/encryption.py. It does not pass the correct key size to the following format and open operations.

Comment 2 Sage McTaggart 2021-12-02 20:31:13 UTC

*** This bug has been marked as a duplicate of bug 2024788 ***