CVE-2018-1129

NameCVE-2018-1129
DescriptionA flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1715-1, DSA-4339-1
NVD severitylow
Debian Bugs913472

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ceph (PTS)jessie0.80.7-2+deb8u2vulnerable
jessie (security)0.80.7-2+deb8u3vulnerable
stretch (security), stretch10.2.11-2fixed
bullseye, sid, buster12.2.11+dfsg1-2.1fixed
linux (PTS)jessie3.16.56-1+deb8u1fixed
jessie (security)3.16.76-1fixed
stretch4.9.189-3fixed
stretch (security)4.9.189-3+deb9u2fixed
buster4.19.67-2fixed
buster (security)4.19.67-2+deb10u2fixed
bullseye5.2.17-1fixed
sid5.3.9-2fixed
linux-4.9 (PTS)jessie (security)4.9.189-3+deb9u2~deb8u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cephsource(unstable)12.2.8+dfsg1-1913472
cephsourcestretch10.2.11-1DSA-4339-1
linuxsource(unstable)4.19.9-1
linuxsourcejessie(not affected)
linuxsourcestretch4.9.144-1
linux-4.9sourcejessie4.9.144-3.1~deb8u1DLA-1715-1

Notes

[jessie] - linux <not-affected> (Message signatures not implemented)
https://git.kernel.org/linus/cc255c76c70f7a87d97939621eae04b600d9f4a1
[jessie] - ceph <no-dsa> (Intrusive changes)
http://tracker.ceph.com/issues/24837
https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587

Search for package or bug name: Reporting problems