It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html | Third Party Advisory |
http://tracker.ceph.com/issues/24836 | Issue Tracking Vendor Advisory |
http://www.openwall.com/lists/oss-security/2020/11/17/3 | |
http://www.openwall.com/lists/oss-security/2020/11/17/4 | |
https://access.redhat.com/errata/RHSA-2018:2177 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2179 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2261 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2274 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1575866 | Issue Tracking Patch Third Party Advisory |
https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4339 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-07-09T00:00:00
Updated: 2020-11-17T18:06:22
Reserved: 2017-12-04T00:00:00
Link: CVE-2018-1128
JSON object: View
NVD Information
Status : Modified
Published: 2018-07-10T14:29:00.370
Modified: 2020-11-17T19:15:10.920
Link: CVE-2018-1128
JSON object: View
Redhat Information
No data.