Bug 2292741 - CVE-2024-34064 cephadm-ansible: jinja2: accepts keys containing non-attribute characters [ceph-8-default]
Summary: CVE-2024-34064 cephadm-ansible: jinja2: accepts keys containing non-attribute...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: Security
Version: 8.0
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: 8.1z3
Assignee: Teoman ONAY
QA Contact: Vivek Das
URL:
Whiteboard: component:cephadm-ansible
Depends On: 2279480 2349920
Blocks: CVE-2024-34064
TreeView+ depends on / blocked
 
Reported: 2024-06-17 19:30 UTC by Sage McTaggart
Modified: 2025-09-04 15:08 UTC (History)
14 users (show)

Fixed In Version:
Doc Type: No Doc Update
Doc Text:
Clone Of: 2279480
Environment:
Last Closed: 2025-09-04 15:08:38 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHCEPH-9179 0 None None None 2024-06-17 19:31:37 UTC

Description Sage McTaggart 2024-06-17 19:30:12 UTC
+++ This bug was initially created as a clone of Bug #2279480 +++


This is a preliminary notification of a potential vulnerability under the accelerated "Triage Tracker" program introduced between Product Security and Engineering to allow deeper collaboration.

The in-depth analysis is ongoing, and details are expected to change until such time as it concludes.

Be aware that someone other than the analyst performing the Secondary Assessment will usually create the triage tracker. The best option is to comment in the tracker and wait for a reply. Based on your regular interactions, if you know the Incident Response Analyst for your offering, you can reach out to them directly or add a private comment in the triage tracker or in the flaw bug for their attention.

Please refer to the FAQ page for more information - https://source.redhat.com/departments/products_and_global_engineering/product_security/content/product_security_wiki/incident_response_coordination_faq

Potential ceph-7 tracking bug for cephadm-ansible: see the bugs linked in the "Blocks" field of this bug for full details of the security issue(s).

This bug is never intended to be made public, please put any public notes in the blocked bugs.

Impact: Moderate
Reported Date: 07-May-2024
Bug is not bound by a Security SLA. Use your own judgement. Remember to explicitly set CLOSED:WONTFIX (in Bugzilla) or Closed:Won't Do (in Jira) if you decide not to fix this bug.

Please review this tracker and its impact on your product or service, as soon as possible. The trackers are filed WITHOUT in-depth analysis as the vulnerability has a Low or Moderate severity impact on this product or service. For more details, please refer to following confluence page - https://docs.engineering.redhat.com/x/3e_3EQ

Please see the Security Errata Policy for further details: https://docs.engineering.redhat.com/x/9kKpDw


Note You need to log in before you can comment on or make changes to this bug.