First published: Tue May 08 2018(Updated: )
A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ceph | <2:10.2.10-28.el7c | 2:10.2.10-28.el7c |
redhat/ceph-ansible | <0:3.0.39-1.el7c | 0:3.0.39-1.el7c |
redhat/ceph | <2:12.2.4-30.el7c | 2:12.2.4-30.el7c |
redhat/cephmetrics | <0:1.0.1-1.el7c | 0:1.0.1-1.el7c |
redhat/nfs-ganesha | <0:2.5.5-6.el7c | 0:2.5.5-6.el7c |
debian/ceph | 12.2.11+dfsg1-2.1 12.2.11+dfsg1-2.1+deb10u1 14.2.21-1 16.2.11+ds-2 16.2.11+ds-5 | |
debian/linux | 4.19.249-2 4.19.289-2 5.10.197-1 5.10.191-1 6.1.55-1 6.1.52-1 6.5.6-1 6.5.8-1 | |
redhat/ceph | <10.2.11 | 10.2.11 |
redhat/ceph | <12.2.6 | 12.2.6 |
redhat/ceph | <13.2.1 | 13.2.1 |
Redhat Ceph Storage | =1.3 | |
Redhat Ceph Storage | =3 | |
Redhat Ceph Storage Mon | =2 | |
Redhat Ceph Storage Mon | =3 | |
Redhat Ceph Storage Osd | =2 | |
Redhat Ceph Storage Osd | =3 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Ceph Ceph | =10.2.0 | |
Ceph Ceph | =10.2.1 | |
Ceph Ceph | =10.2.2 | |
Ceph Ceph | =10.2.3 | |
Ceph Ceph | =10.2.4 | |
Ceph Ceph | =10.2.5 | |
Ceph Ceph | =10.2.6 | |
Ceph Ceph | =10.2.7 | |
Ceph Ceph | =10.2.8 | |
Ceph Ceph | =10.2.9 | |
Ceph Ceph | =10.2.10 | |
Ceph Ceph | =10.2.11 | |
Ceph Ceph | =12.2.0 | |
Ceph Ceph | =12.2.1 | |
Ceph Ceph | =12.2.2 | |
Ceph Ceph | =12.2.3 | |
Ceph Ceph | =12.2.4 | |
Ceph Ceph | =12.2.5 | |
Ceph Ceph | =12.2.6 | |
Ceph Ceph | =12.2.7 | |
Ceph Ceph | =13.2.0 | |
Ceph Ceph | =13.2.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2018-1129.
The severity of CVE-2018-1129 is medium.
The vulnerability in CVE-2018-1129 allows an attacker with access to the ceph cluster network to bypass signature checks done by the cephx authentication protocol.
Software versions 10.2.11, 12.2.6, 13.2.1, and earlier are affected by CVE-2018-1129.
Yes, updating ceph to versions 10.2.11, 12.2.6, 13.2.1, or later will remediate the vulnerability.