CVE-2018-1129

NameCVE-2018-1129
DescriptionA flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-4339-1
NVD severitylow (attack range: remote)
Debian Bugs913472

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ceph (PTS)jessie0.80.7-2+deb8u2vulnerable
buster, stretch10.2.5-7.2vulnerable
stretch (security)10.2.11-1fixed
sid12.2.8+dfsg1-2fixed
linux (PTS)jessie3.16.56-1+deb8u1fixed
jessie (security)3.16.59-1fixed
stretch4.9.130-2vulnerable
stretch (security)4.9.110-3+deb9u6vulnerable
buster, sid4.18.10-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cephsource(unstable)12.2.8+dfsg1-1low913472
cephsourcestretch10.2.11-1lowDSA-4339-1
linuxsource(unstable)(unfixed)low
linuxsourcejessie(not affected)

Notes

[jessie] - linux <not-affected> (Message signatures not implemented)
https://git.kernel.org/linus/cc255c76c70f7a87d97939621eae04b600d9f4a1
[jessie] - ceph <no-dsa> (Intrusive changes)
http://tracker.ceph.com/issues/24837
https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587

Search for package or bug name: Reporting problems