It was found Ceph versions before 13.2.4 that authenticated ceph users with read only permissions could steal dm-crypt encryption keys used in ceph disk encryption.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14662 | patch third party advisory issue tracking |
https://ceph.com/releases/13-2-4-mimic-released | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html | vendor advisory mailing list third party advisory |
https://usn.ubuntu.com/4035-1/ | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2538 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2541 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html | third party advisory mailing list |