CVE-2022-3650
Published: 17 January 2023
A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump, and dump privileged information.
Notes
Author | Note |
---|---|
mdeslaur | This is fixed in 17.2.6 in lunar-proposed, but is not yet in the -security pocket. |
Priority
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not present)
|
focal |
Released
(15.2.17-0ubuntu0.20.04.3)
|
|
jammy |
Released
(17.2.5-0ubuntu0.22.04.3)
|
|
kinetic |
Released
(17.2.5-0ubuntu0.22.10.3)
|
|
lunar |
Needed
|
|
trusty |
Needed
|
|
upstream |
Released
(17.2.6)
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://github.com/ceph/ceph/pull/48804 (pacific) upstream: https://github.com/ceph/ceph/pull/48805 (quincy) upstream: https://github.com/ceph/ceph/commit/45915540559126a652f8d9d105723584cfc63439 (main) upstream: https://github.com/ceph/ceph/commit/130c9626598bc3a75942161e6cce7c664c447382 (main) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |