It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html | Third Party Advisory |
http://tracker.ceph.com/issues/24836 | Issue Tracking Vendor Advisory |
http://www.openwall.com/lists/oss-security/2020/11/17/3 | |
http://www.openwall.com/lists/oss-security/2020/11/17/4 | |
https://access.redhat.com/errata/RHSA-2018:2177 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2179 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2261 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2274 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1575866 | Issue Tracking Patch Third Party Advisory |
https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4339 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2018-07-10 14:29
Updated : 2020-11-17 19:15
NVD link : CVE-2018-1128
Mitre link : CVE-2018-1128
CVE.ORG link : CVE-2018-1128
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- ceph
- enterprise_linux_desktop
- ceph_storage_mon
- ceph_storage_osd
- enterprise_linux
- enterprise_linux_workstation
- ceph_storage
opensuse
- leap
debian
- debian_linux