Source: ceph Version: 10.2.5-7.2 Severity: grave Tags: security upstream Justification: user security hole Control: fixed -1 10.2.11-1
Hi, The following vulnerability was published for ceph. CVE-2018-1128[0]: | It was found that cephx authentication protocol did not verify ceph | clients correctly and was vulnerable to replay attack. Any attacker | having access to ceph cluster network who is able to sniff packets on | network can use this vulnerability to authenticate with ceph service | and perform actions allowed by ceph service. Ceph branches master, | mimic, luminous and jewel are believed to be vulnerable. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-1128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128 Please adjust the affected versions in the BTS as needed. Regards, Salvatore