Vulnerability Description
A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump, and dump privileged information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Ceph | 16.2.9 |
Related Weaknesses (CWE)
References
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://seclists.org/oss-sec/2022/q4/41ExploitMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202312-10
- https://lists.debian.org/debian-lts-announce/2025/09/msg00025.html
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://seclists.org/oss-sec/2022/q4/41ExploitMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202312-10
FAQ
What is CVE-2022-3650?
CVE-2022-3650 is a vulnerability with a CVSS score of 7.8 (HIGH). A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump, and dump privileged information.
How severe is CVE-2022-3650?
CVE-2022-3650 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3650?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Ceph.