CVE-2018-1129
Published: 10 July 2018
A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
Priority
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Not vulnerable
(12.2.7-0ubuntu0.18.04.1)
|
|
cosmic |
Not vulnerable
(13.2.4+dfsg1-0ubuntu0.18.10.1)
|
|
disco |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
eoan |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
focal |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
groovy |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
hirsute |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
impish |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
jammy |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
kinetic |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
lunar |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
mantic |
Not vulnerable
(13.2.4+dfsg1-0ubuntu1)
|
|
trusty |
Needed
|
|
upstream |
Released
(10.2.11,12.2.6)
|
|
xenial |
Not vulnerable
(10.2.11-0ubuntu0.16.04.1)
|
|
Patches: upstream: https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587 upstream: https://github.com/ceph/ceph/commit/436b08688a5be238280a6e93de8658c10d72044c upstream: https://github.com/ceph/ceph/commit/546d15b25eb2af8b27ec509344c1a45387f77a57 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Adjacent |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |