Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-528j-9r78-wffx: etcd user credentials are stored in WAL logs in plaintext

Vulnerability type

Data Exposure

Workarounds

The etcd assumes that the on disk files are secure. The possible fixes have been provided, however, it is the responsibility of the etcd users to make sure that the etcd server WAL log files are secure. The etcd doesn’t encrypt key/value data stored on disk drives.

Detail

User credentials (login and password) are stored in WAL entries on each user authentication. If the WAL log files are not secure, it can potentially expose sensitive information.

References

Find out more on this vulnerability in the security audit report

For more information

If you have any questions or comments about this advisory:

ghsa
#vulnerability#git#pdf#auth

Vulnerability type

Data Exposure

Workarounds

The etcd assumes that the on disk files are secure. The possible fixes have been provided, however, it is the responsibility of the etcd users to make sure that the etcd server WAL log files are secure. The etcd doesn’t encrypt key/value data stored on disk drives.

Detail

User credentials (login and password) are stored in WAL entries on each user authentication. If the WAL log files are not secure, it can potentially expose sensitive information.

References

Find out more on this vulnerability in the security audit report

For more information

If you have any questions or comments about this advisory:

  • Contact the etcd security committee

References

  • GHSA-528j-9r78-wffx

ghsa: Latest News

GHSA-7p9f-6x8j-gxxp: CRI-O: Maliciously structured checkpoint file can gain arbitrary node access