During internal testing of libzmq/zeromq - https://github.com/zeromq/libzmq - the possibility of unauthenticated clients causing a denial-of-service that affects authenticated and encrypted clients was uncovered.
Created zeromq tracking bugs for this issue: Affects: epel-all [bug 1876690] Affects: fedora-all [bug 1876689] Created zeromq3 tracking bugs for this issue: Affects: epel-all [bug 1876691]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-15166
External References: https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m
Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Created zeromq tracking bugs for this issue: Affects: openstack-rdo [bug 1878608]
https://github.com/zeromq/libzmq/pull/3913 https://github.com/zeromq/libzmq/pull/3973 Upstream fix.
Statement: Red Hat Ceph Storage 2 is now in Extended Life Support (ELS) Phase of the support and maintenance life cycle and receives only qualified Important and Critical impact security fixes. This issue has been rated as having a security impact of Moderate, and is not currently planed to be addressed in future updates. For additional information, refer to the Red Hat Ceph Storage Life Cycle: https://access.redhat.com/articles/1372203