A flaw was found, where there's a problem with the secure mode of msgr2, which breaks confidentiality and integrity aspects for long-lived sessions.
Name: Ilya Dryomov (Red Hat)
Created ceph tracking bugs for this issue:
Affects: fedora-all [bug 1821586]
The patches are currently available from ceph.git clone(ceph-ci) and will be pushed to active releases soon.
Patches are merged in upstream Octopus version 15.2.1 via PR https://github.com/ceph/ceph/pull/34482
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Nautilus fixes v14.2.9:
This flaw was introduced in commit https://github.com/ceph/ceph/commit/fe387e02b11df98357d8cdbfa3b1f1d5f2bb3f74 ("msg/async, v2: drop depedency on uint128_t. Clean up onwire crypto.")
Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 are affected by this vulnerability as reuse of a nonce is possible with the shipped versions of ceph.
Red Hat Ceph Storage 2 and 3 are not affected by this vulnerability as they do not provide support for secure mode of messenger v2 protocol.
This issue did not affect the versions of ceph as shipped with Red Hat Enterprise Linux 8 as they did not include support for secure mode of messenger v2 protocol.