First published: Tue Jan 17 2023(Updated: )
A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump, and dump privileged information.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ceph | =16.2.9 | |
ubuntu/ceph | <15.2.17-0ubuntu0.20.04.3 | 15.2.17-0ubuntu0.20.04.3 |
ubuntu/ceph | <17.2.5-0ubuntu0.22.04.3 | 17.2.5-0ubuntu0.22.04.3 |
ubuntu/ceph | <17.2.5-0ubuntu0.22.10.3 | 17.2.5-0ubuntu0.22.10.3 |
ubuntu/ceph | <17.2.6-0ubuntu0.23.04.2 | 17.2.6-0ubuntu0.23.04.2 |
ubuntu/ceph | <17.2.6-0ubuntu1 | 17.2.6-0ubuntu1 |
ubuntu/ceph | <17.2.6 | 17.2.6 |
debian/ceph | <=14.2.21-1 | 12.2.11+dfsg1-2.1 12.2.11+dfsg1-2.1+deb10u1 16.2.11+ds-2 16.2.11+ds-5 18.2.1+ds-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3650 is a privilege escalation flaw found in Ceph, specifically in the Ceph-crash.service component.
CVE-2022-3650 allows a local attacker to escalate privileges to root by exploiting the crash dump functionality and accessing privileged information.
The severity of CVE-2022-3650 is rated as high, with a severity value of 7.8.
To mitigate CVE-2022-3650, update your Ceph package to version 17.2.5-0ubuntu0.22.10.3 or higher, 17.2.6-0ubuntu0.23.04.2 or higher, or 17.2.6 or higher depending on your distribution.
More information about CVE-2022-3650 can be found in the provided references: [link1], [link2], [link3].