Bug 1811712 (CVE-2020-1759)
Summary: | CVE-2020-1759 ceph: secure mode of msgr2 breaks both confidentiality and integrity aspects for long-lived sessions | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | anharris, bniver, danmick, david, fedora, gfidente, hvyas, idryomov, i, jdurgin, jjoyce, josef, jschluet, lhh, loic, lpeer, mburns, nojha, ramkrsna, rzarzyns, sclewis, slinaber, sostapov, steve |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ceph 15.2.1, ceph 14.2.9 | Doc Type: | If docs needed, set a value |
Doc Text: |
A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1812762, 1812763, 1812773, 1821586 | ||
Bug Blocks: | 1811724 |
Description
Marian Rehak
2020-03-09 15:27:57 UTC
Acknowledgments: Name: Ilya Dryomov (Red Hat) Created ceph tracking bugs for this issue: Affects: fedora-all [bug 1821586] Upstream Patches: https://github.com/ceph/ceph-ci/commit/84d2e215969cde830b086d11544aeb3666614211 https://github.com/ceph/ceph-ci/commit/659ec7dc6e30fe961832f813da007f49e603a33d The patches are currently available from ceph.git clone(ceph-ci) and will be pushed to active releases soon. Patches are merged in upstream Octopus version 15.2.1 via PR https://github.com/ceph/ceph/pull/34482 https://github.com/ceph/ceph/commit/20b7bb685c5ea74c651ca1ea547ac66b0fee7035 https://github.com/ceph/ceph/commit/dfd1d81cec62e21e21696dc87d4db5f920e51a67 External References: https://www.openwall.com/lists/oss-security/2020/04/07/2 Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. Nautilus fixes v14.2.9: https://github.com/ceph/ceph/commit/47c7e623546a7a33bd6bbddfb899fa9c9a40f40a https://github.com/ceph/ceph/commit/f6c5ad8a5f534d73cba9c6bd794a89e879c46ecc This flaw was introduced in commit https://github.com/ceph/ceph/commit/fe387e02b11df98357d8cdbfa3b1f1d5f2bb3f74 ("msg/async, v2: drop depedency on uint128_t. Clean up onwire crypto.") Statement: Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 are affected by this vulnerability as reuse of a nonce is possible with the shipped versions of ceph. Red Hat Ceph Storage 2 and 3 are not affected by this vulnerability as they do not provide support for secure mode of messenger v2 protocol. This issue did not affect the versions of ceph as shipped with Red Hat Enterprise Linux 8 as they did not include support for secure mode of messenger v2 protocol. |