CVE-2022-3261
Publication date 15 September 2023
Last updated 11 February 2026
Ubuntu priority
Cvss 3 Severity Score
Description
A flaw was found in OpenStack. Multiple components show plain-text passwords in /var/log/messages during the OpenStack overcloud update run, leading to a disclosure of sensitive information problem.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| openstack | 25.10 questing | Not in release |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal | Not in release | |
| 18.04 LTS bionic | Ignored end of standard support | |
| 16.04 LTS xenial | Ignored see note | |
| 14.04 LTS trusty | Ignored end of standard support |
Notes
john-breton
We are taking the same position that Debian has taken regarding this CVE. Namely, permission management for log files should be the purview of a system's local administrator. The information leak cannot occur unless some other vulnerability is exploited to first access the low files. As such this isn't a true vulnerability. Further there is no fix available upstream because they also don't view it as a valid CVE. As such we will be ignoring it.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | High |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |