Bug 1811712 (CVE-2020-1759) - CVE-2020-1759 ceph: secure mode of msgr2 breaks both confidentiality and integrity aspects for long-lived sessions
Summary: CVE-2020-1759 ceph: secure mode of msgr2 breaks both confidentiality and inte...
Keywords:
Status: NEW
Alias: CVE-2020-1759
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1812762 1812763 1812773 1821586
Blocks: 1811724
TreeView+ depends on / blocked
 
Reported: 2020-03-09 15:27 UTC by Marian Rehak
Modified: 2020-07-14 11:11 UTC (History)
33 users (show)

Fixed In Version: ceph 15.2.1, ceph 14.2.9
Doc Type: If docs needed, set a value
Doc Text:
A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Marian Rehak 2020-03-09 15:27:57 UTC
A flaw was found, where there's a problem with the secure mode of msgr2, which breaks confidentiality and integrity aspects for long-lived sessions.

Comment 3 Hardik Vyas 2020-03-12 05:15:04 UTC
Acknowledgments:

Name: Ilya Dryomov (Red Hat)

Comment 8 Hardik Vyas 2020-04-07 06:57:08 UTC
Created ceph tracking bugs for this issue:

Affects: fedora-all [bug 1821586]

Comment 9 Hardik Vyas 2020-04-07 07:05:53 UTC
Upstream Patches:

https://github.com/ceph/ceph-ci/commit/84d2e215969cde830b086d11544aeb3666614211
https://github.com/ceph/ceph-ci/commit/659ec7dc6e30fe961832f813da007f49e603a33d

The patches are currently available from ceph.git clone(ceph-ci) and will be pushed to active releases soon.

Comment 11 Hardik Vyas 2020-04-13 09:34:30 UTC
External References:

https://www.openwall.com/lists/oss-security/2020/04/07/2

Comment 13 Hardik Vyas 2020-04-14 05:49:17 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 15 Riccardo Schirone 2020-04-24 10:40:18 UTC
This flaw was introduced in commit https://github.com/ceph/ceph/commit/fe387e02b11df98357d8cdbfa3b1f1d5f2bb3f74 ("msg/async, v2: drop depedency on uint128_t. Clean up onwire crypto.")

Comment 16 Riccardo Schirone 2020-04-24 10:43:03 UTC
Statement:

Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 are affected by this vulnerability as reuse of a nonce is possible with the shipped versions of ceph.

Red Hat Ceph Storage 2 and 3 are not affected by this vulnerability  as they do not provide support for secure mode of messenger v2 protocol.

This issue did not affect the versions of ceph as shipped with Red Hat Enterprise Linux 8 as they did not include support for secure mode of messenger v2 protocol.


Note You need to log in before you can comment on or make changes to this bug.