Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 918583 (CVE-2023-31422) - www-apps/kibana-bin: leakage of secret into logs
Summary: www-apps/kibana-bin: leakage of secret into logs
Status: RESOLVED INVALID
Alias: CVE-2023-31422
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~4 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-25 23:18 UTC by John Helmert III
Modified: 2023-11-26 18:28 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-11-25 23:18:14 UTC
CVE-2023-31422 (https://discuss.elastic.co/t/kibana-8-10-1-security-update/343287):

An issue was discovered by Elastic whereby sensitive information is recorded in Kibana logs in the event of an error. The issue impacts only Kibana version 8.10.0 when logging in the JSON layout or when the pattern layout is configured to log the %meta pattern. Elastic has released Kibana 8.10.1 which resolves this issue. The error object recorded in the log contains request information, which can include sensitive data, such as authentication credentials, cookies, authorization headers, query params, request paths, and other metadata. Some examples of sensitive data which can be included in the logs are account credentials for kibana_system, kibana-metricbeat, or Kibana end-users.

Please bump to 8.10.1.
Comment 1 Hans de Graaff gentoo-dev Security 2023-11-26 10:13:34 UTC
As far as I can tell Gentoo is not vulnerable to this since we never had 8.10.0 is the tree (or any 8.x version) and that is the only vulnerable version.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-11-26 18:28:23 UTC
Hm, I guess we're not vulnerable to this then. It might be a good idea to start getting an 8.x version packaged now that we're based on of the potential EOL conditions for 7.17 in https://www.elastic.co/support/eol:

Supported/maintained until "The later of 2023-08-01 or the release date of 9.0.0"