Bug 1875223 (CVE-2020-15166) - CVE-2020-15166 zeromq: unauthenticated clients causing denial-of-service
Summary: CVE-2020-15166 zeromq: unauthenticated clients causing denial-of-service
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2020-15166
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1876690 1876691 1876689 1878608
Blocks: 1875227
TreeView+ depends on / blocked
 
Reported: 2020-09-03 04:02 UTC by Dhananjay Arunesh
Modified: 2021-06-08 14:40 UTC (History)
14 users (show)

Fixed In Version: libzmq 4.3.3
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in ZeroMQ, where the possibility of unauthenticated clients causes a denial of service that affects authenticated and encrypted clients. The highest threat from this vulnerability is to system availability.
Clone Of:
Environment:
Last Closed: 2020-09-08 01:17:45 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2020-09-03 04:02:20 UTC
During internal testing of libzmq/zeromq - https://github.com/zeromq/libzmq - the possibility of unauthenticated clients causing a denial-of-service that affects authenticated and encrypted clients was uncovered.

Comment 1 Marian Rehak 2020-09-08 01:03:39 UTC
Created zeromq tracking bugs for this issue:

Affects: epel-all [bug 1876690]
Affects: fedora-all [bug 1876689]


Created zeromq3 tracking bugs for this issue:

Affects: epel-all [bug 1876691]

Comment 2 Product Security DevOps Team 2020-09-08 01:17:45 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-15166

Comment 3 Hardik Vyas 2020-09-08 04:58:10 UTC
External References:

https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m

Comment 4 Hardik Vyas 2020-09-08 04:58:13 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 5 Marian Rehak 2020-09-14 07:09:01 UTC
Created zeromq tracking bugs for this issue:

Affects: openstack-rdo [bug 1878608]

Comment 9 Hardik Vyas 2020-09-18 11:44:14 UTC
Statement:

Red Hat Ceph Storage 2 is now in Extended Life Support (ELS) Phase of the support and maintenance life cycle and receives only qualified Important and Critical impact security fixes. This issue has been rated as having a security impact of Moderate, and is not currently planed to be addressed in future updates. For additional information, refer to the Red Hat Ceph Storage Life Cycle: https://access.redhat.com/articles/1372203


Note You need to log in before you can comment on or make changes to this bug.