Описание
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to the ceph cluster network who is also able to sniff packets on the network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service.
Отчет
Red Hat OpenStack Platform ships the flawed package, however RHOSP deployments use the ceph package directly from the Ceph channel. A RHOSP ceph update will therefore not be provided at this time, but please ensure that the underlying Red Hat Ceph Storage is updated.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Ceph Storage 1.3 | ceph | Will not fix | ||
Red Hat Enterprise Linux 7 | ceph-common | Will not fix | ||
Red Hat Enterprise Linux 8 | ceph | Not affected | ||
Red Hat OpenStack Platform 13 (Queens) | ceph | Will not fix | ||
Red Hat Ceph Storage 2.5 | ceph | Fixed | RHSA-2018:2261 | 26.07.2018 |
Red Hat Ceph Storage 2.5 | ceph-ansible | Fixed | RHSA-2018:2261 | 26.07.2018 |
Red Hat Ceph Storage 2 for Ubuntu | Fixed | RHSA-2018:2274 | 26.07.2018 | |
Red Hat Ceph Storage 3.0 | ceph | Fixed | RHSA-2018:2177 | 11.07.2018 |
Red Hat Ceph Storage 3.0 | ceph-ansible | Fixed | RHSA-2018:2177 | 11.07.2018 |
Red Hat Ceph Storage 3.0 | cephmetrics | Fixed | RHSA-2018:2177 | 11.07.2018 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.9 Medium
CVSS3
Связанные уязвимости
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
It was found that cephx authentication protocol did not verify ceph cl ...
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
EPSS
5.9 Medium
CVSS3