vulnerability

Red Hat: CVE-2018-14662: Moderate: Red Hat Ceph Storage 3.3 security, bug fix, and enhancement update (RHSA-2019:2538)

Severity
3
CVSS
(AV:A/AC:L/Au:S/C:P/I:N/A:N)
Published
Jan 15, 2019
Added
Mar 5, 2020
Modified
Jan 30, 2023

Description

It was found Ceph versions before 13.2.4 that authenticated ceph users with read only permissions could steal dm-crypt encryption keys used in ceph disk encryption.

Solutions

redhat-upgrade-ceph-ansibleredhat-upgrade-ceph-baseredhat-upgrade-ceph-commonredhat-upgrade-ceph-debuginforedhat-upgrade-ceph-fuseredhat-upgrade-ceph-iscsi-configredhat-upgrade-ceph-mdsredhat-upgrade-ceph-radosgwredhat-upgrade-ceph-selinuxredhat-upgrade-cephmetrics-ansibleredhat-upgrade-libcephfs-develredhat-upgrade-libcephfs2redhat-upgrade-libntirpcredhat-upgrade-libntirpc-debuginforedhat-upgrade-librados-develredhat-upgrade-libradosstriper1redhat-upgrade-librbd-develredhat-upgrade-librgw-develredhat-upgrade-librgw2redhat-upgrade-nfs-ganesharedhat-upgrade-nfs-ganesha-cephredhat-upgrade-nfs-ganesha-debuginforedhat-upgrade-nfs-ganesha-rgwredhat-upgrade-python-cephfsredhat-upgrade-python-crypto-debuginforedhat-upgrade-python-rgwredhat-upgrade-python2-cryptoredhat-upgrade-rbd-mirror
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.