Source: ceph
Version: 10.2.5-7.2
Severity: grave
Tags: security upstream
Justification: user security hole
Control: fixed -1 10.2.11-1

Hi,

The following vulnerability was published for ceph.

CVE-2018-1128[0]:
| It was found that cephx authentication protocol did not verify ceph
| clients correctly and was vulnerable to replay attack. Any attacker
| having access to ceph cluster network who is able to sniff packets on
| network can use this vulnerability to authenticate with ceph service
| and perform actions allowed by ceph service. Ceph branches master,
| mimic, luminous and jewel are believed to be vulnerable.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-1128
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to