|Description||It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
Vulnerable and fixed packages
The table below lists information on source packages.
|stretch (security), stretch||10.2.11-2||fixed|
|bullseye, sid, buster||12.2.11+dfsg1-2.1||fixed|
|linux-4.9 (PTS)||jessie (security)||4.9.189-3+deb9u1~deb8u1||fixed|
The information below is based on the following data on fixed versions.
[jessie] - linux <ignored> (Protocol change is too difficult)
[jessie] - ceph <no-dsa> (Intrusive changes)