Seagate STX driver: Weak Cryptographic Algorithm (MD5) used
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Cinder |
New
|
Undecided
|
Unassigned | ||
OpenStack Security Advisory |
Won't Fix
|
Undecided
|
Unassigned |
Bug Description
## Overview
In the file [client.py](https:/
One possible fix would be to use `sha3_256` or `sha3_512` algorithm from Python's `hashlib` library to replace the current `md5` algorithm.
### CLA Requirements:
This section is only relevant if your project requires contributors to sign a Contributor License Agreement (CLA) for external contributions.
All contributed commits are already automatically signed off.
The meaning of a signoff depends on the project, but it typically certifies that committer has the rights to submit this work under the same license and agrees to a Developer Certificate of Origin (see [https:/
- [Git Commit Sign Off documentation](https:/
### Sponsorship and Support:
This work is done by the security researchers from OpenRefactory and is supported by the [Open Source Security Foundation (OpenSSF)](https:/
The bug is found by running the iCR tool by [OpenRefactory, Inc.](https:/
tags: | added: drivers stx |
I've switched this report to a normal public bug and added a "won't fix" security advisory task to indicate that it's not something we'll be publishing an advisory about.
Note that the line referred to in the script is prefaced with a TODO comment pointing out pretty much exactly the same concern as was raised here.
The VMT is treating this as a class D report (security hardening opportunity) per our taxonomy: https:/ /security. openstack. org/vmt- process. html#report- taxonomy