Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
This project is now read‑only. Starting Monday, February 2, please use https://ibm-ceph.atlassian.net/ for all bug tracking management.

Bug 2292741

Summary: CVE-2024-34064 cephadm-ansible: jinja2: accepts keys containing non-attribute characters [ceph-8-default]
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Sage McTaggart <amctagga>
Component: SecurityAssignee: Teoman ONAY <tonay>
Status: CLOSED NOTABUG QA Contact: Vivek Das <vdas>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 8.0CC: amctagga, aoconnor, bniver, ceph-eng-bugs, cephqe-warriors, flucifre, gmeno, mbenjamin, mhackett, rkeshri, saraut, sostapov, vdas, vereddy
Target Milestone: ---Keywords: Reopened, Security, SecurityTracking
Target Release: 8.1z3   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: component:cephadm-ansible
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: 2279480 Environment:
Last Closed: 2025-09-04 15:08:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2279480, 2349920    
Bug Blocks: 2279476    

Description Sage McTaggart 2024-06-17 19:30:12 UTC
+++ This bug was initially created as a clone of Bug #2279480 +++


This is a preliminary notification of a potential vulnerability under the accelerated "Triage Tracker" program introduced between Product Security and Engineering to allow deeper collaboration.

The in-depth analysis is ongoing, and details are expected to change until such time as it concludes.

Be aware that someone other than the analyst performing the Secondary Assessment will usually create the triage tracker. The best option is to comment in the tracker and wait for a reply. Based on your regular interactions, if you know the Incident Response Analyst for your offering, you can reach out to them directly or add a private comment in the triage tracker or in the flaw bug for their attention.

Please refer to the FAQ page for more information - https://source.redhat.com/departments/products_and_global_engineering/product_security/content/product_security_wiki/incident_response_coordination_faq

Potential ceph-7 tracking bug for cephadm-ansible: see the bugs linked in the "Blocks" field of this bug for full details of the security issue(s).

This bug is never intended to be made public, please put any public notes in the blocked bugs.

Impact: Moderate
Reported Date: 07-May-2024
Bug is not bound by a Security SLA. Use your own judgement. Remember to explicitly set CLOSED:WONTFIX (in Bugzilla) or Closed:Won't Do (in Jira) if you decide not to fix this bug.

Please review this tracker and its impact on your product or service, as soon as possible. The trackers are filed WITHOUT in-depth analysis as the vulnerability has a Low or Moderate severity impact on this product or service. For more details, please refer to following confluence page - https://docs.engineering.redhat.com/x/3e_3EQ

Please see the Security Errata Policy for further details: https://docs.engineering.redhat.com/x/9kKpDw