{
  "threat_severity" : "Moderate",
  "public_date" : "2020-04-06T17:00:00Z",
  "bugzilla" : {
    "description" : "ceph: secure mode of msgr2 breaks both confidentiality and integrity aspects for long-lived sessions",
    "id" : "1811712",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1811712"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-323",
  "details" : [ "A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.", "A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks." ],
  "statement" : "Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 are affected by this vulnerability as reuse of a nonce is possible with the shipped versions of ceph.\nRed Hat Ceph Storage 2 and 3 are not affected by this vulnerability  as they do not provide support for secure mode of messenger v2 protocol.\nThis issue did not affect the versions of ceph as shipped with Red Hat Enterprise Linux 8 as they did not include support for secure mode of messenger v2 protocol.",
  "acknowledgement" : "This issue was discovered by Ilya Dryomov (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat Ceph Storage 4.1",
    "release_date" : "2020-09-30T00:00:00Z",
    "advisory" : "RHBA-2020:4144",
    "cpe" : "cpe:/a:redhat:ceph_storage:4::el7",
    "package" : "ceph-2:14.2.8-111.el7cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 4.1",
    "release_date" : "2020-09-30T00:00:00Z",
    "advisory" : "RHBA-2020:4144",
    "cpe" : "cpe:/a:redhat:ceph_storage:4::el7",
    "package" : "ceph-ansible-0:4.0.31-1.el7cp"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Ceph Storage 2",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:2"
  }, {
    "product_name" : "Red Hat Ceph Storage 3",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Openshift Container Storage 4",
    "fix_state" : "Will not fix",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openshift_container_storage:4"
  }, {
    "product_name" : "Red Hat OpenStack Platform 13 (Queens)",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openstack:13"
  }, {
    "product_name" : "Red Hat OpenStack Platform 15 (Stein)",
    "fix_state" : "Affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openstack:15"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-1759\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-1759\nhttps://www.openwall.com/lists/oss-security/2020/04/07/2" ],
  "name" : "CVE-2020-1759",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}