Bug 1875223 (CVE-2020-15166)
Summary: | CVE-2020-15166 zeromq: unauthenticated clients causing denial-of-service | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | andrewniemants, dbecker, denis.arnaud_fedora, extras-orphan, hvyas, jjoyce, jschluet, lhh, lpeer, mburns, sclewis, security-response-team, slinaber, tomspur |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libzmq 4.3.3 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in ZeroMQ, where the possibility of unauthenticated clients causes a denial of service that affects authenticated and encrypted clients. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-09-08 01:17:45 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1876690, 1876691, 1876689, 1878608 | ||
Bug Blocks: | 1875227 |
Description
Dhananjay Arunesh
2020-09-03 04:02:20 UTC
Created zeromq tracking bugs for this issue: Affects: epel-all [bug 1876690] Affects: fedora-all [bug 1876689] Created zeromq3 tracking bugs for this issue: Affects: epel-all [bug 1876691] This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-15166 External References: https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. Created zeromq tracking bugs for this issue: Affects: openstack-rdo [bug 1878608] Statement: Red Hat Ceph Storage 2 is now in Extended Life Support (ELS) Phase of the support and maintenance life cycle and receives only qualified Important and Critical impact security fixes. This issue has been rated as having a security impact of Moderate, and is not currently planed to be addressed in future updates. For additional information, refer to the Red Hat Ceph Storage Life Cycle: https://access.redhat.com/articles/1372203 |