CVE-2018-16889
Publication date 28 January 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.
Status
Package | Ubuntu Release | Status |
---|---|---|
ceph | ||
18.04 LTS bionic |
Fixed 12.2.11-0ubuntu0.18.04.1
|
|
16.04 LTS xenial |
Fixed 10.2.11-0ubuntu0.16.04.2
|
|
14.04 LTS trusty |
Not affected
|
Notes
mdeslaur
In Xenial, there are many more instances of information being logged. We will not be fixing this issue in Xenial.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-4035-1
- Ceph vulnerabilities
- 25 June 2019