Sensitive data could be exposed in logs of subiquity version 23.09.1 and earlier. An attacker in the adm group could use this information to find hashed passwords and possibly escalate their privilege.
References
Link | Resource |
---|---|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5182 | Patch Third Party Advisory |
https://github.com/canonical/subiquity/pull/1820/commits/62e126896fb063808767d74d00886001e38eaa1c | Patch |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5182 | Patch Third Party Advisory |
https://github.com/canonical/subiquity/pull/1820/commits/62e126896fb063808767d74d00886001e38eaa1c | Patch |
Configurations
History
21 Nov 2024, 08:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-07 00:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5182
Mitre link : CVE-2023-5182
CVE.ORG link : CVE-2023-5182
JSON object : View
Products Affected
canonical
- subiquity
CWE
CWE-532
Insertion of Sensitive Information into Log File