vulnerability

Red Hat: CVE-2018-16889: Moderate: Red Hat Ceph Storage 3.3 security, bug fix, and enhancement update (RHSA-2019:2538)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Jan 28, 2019
Added
Mar 5, 2020
Modified
Feb 14, 2023

Description

Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.

Solutions

redhat-upgrade-ceph-ansibleredhat-upgrade-ceph-baseredhat-upgrade-ceph-commonredhat-upgrade-ceph-debuginforedhat-upgrade-ceph-fuseredhat-upgrade-ceph-iscsi-configredhat-upgrade-ceph-mdsredhat-upgrade-ceph-radosgwredhat-upgrade-ceph-selinuxredhat-upgrade-cephmetrics-ansibleredhat-upgrade-libcephfs-develredhat-upgrade-libcephfs2redhat-upgrade-libntirpcredhat-upgrade-libntirpc-debuginforedhat-upgrade-librados-develredhat-upgrade-libradosstriper1redhat-upgrade-librbd-develredhat-upgrade-librgw-develredhat-upgrade-librgw2redhat-upgrade-nfs-ganesharedhat-upgrade-nfs-ganesha-cephredhat-upgrade-nfs-ganesha-debuginforedhat-upgrade-nfs-ganesha-rgwredhat-upgrade-python-cephfsredhat-upgrade-python-crypto-debuginforedhat-upgrade-python-rgwredhat-upgrade-python2-cryptoredhat-upgrade-rbd-mirror
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.