First published: Tue Oct 09 2018(Updated: )
It was found Ceph versions before 13.2.4 that authenticated ceph users with read only permissions could steal dm-crypt encryption keys used in ceph disk encryption.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ceph | <13.2.4 | 13.2.4 |
Redhat Ceph | <13.2.4 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
Redhat Ceph Storage | =2.0 | |
Redhat Ceph Storage | =3.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
debian/ceph | 14.2.21-1 16.2.11+ds-2 16.2.15+ds-0+deb12u1 18.2.4+ds-11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14662 is a vulnerability found in Ceph versions before 13.2.4 that allows authenticated ceph users with read only permissions to steal dm-crypt encryption keys used in ceph disk encryption.
The severity of CVE-2018-14662 is medium with a severity value of 5.7.
Ceph versions before 13.2.4 are affected by CVE-2018-14662.
To fix CVE-2018-14662, it is recommended to update to Ceph version 13.2.4 or later.
You can find more information about CVE-2018-14662 at the following references: [1](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html), [2](https://access.redhat.com/errata/RHSA-2019:2538), [3](https://access.redhat.com/errata/RHSA-2019:2541).