Name | CVE-2020-1759 |
Description | A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 956139 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ceph (PTS) | bullseye | 14.2.21-1 | fixed |
bookworm | 16.2.11+ds-2 | fixed | |
sid, trixie | 18.2.4+ds-10 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ceph | source | jessie | (not affected) | |||
ceph | source | stretch | (not affected) | |||
ceph | source | buster | (not affected) | |||
ceph | source | (unstable) | 14.2.9-1 | 956139 |
[buster] - ceph <not-affected> (Vulnerable code not present)
[stretch] - ceph <not-affected> (Vulnerable code not present)
[jessie] - ceph <not-affected> (Vulnerable code not present)
Introduced with: https://github.com/ceph/ceph-ci/commit/fe387e02b11df98357d8cdbfa3b1f1d5f2bb3f74
Fixed by: https://github.com/ceph/ceph-ci/commit/84d2e215969cde830b086d11544aeb3666614211
Fixed by: https://github.com/ceph/ceph-ci/commit/659ec7dc6e30fe961832f813da007f49e603a33d
https://www.openwall.com/lists/oss-security/2020/04/07/2