Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-3979


A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.


Published

2022-08-25T20:15:09.473

Last Modified

2024-11-21T06:23:17.720

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-327
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat ceph_storage 3.0 Yes
Application redhat ceph_storage 4.3 Yes
Application redhat ceph_storage 5.1 Yes
Application redhat openshift_container_storage 4.0 Yes
Application redhat openshift_data_foundation 4.0 Yes
Application redhat openstack_platform 13.0 Yes
Operating System redhat ceph_storage_for_ibm_z_systems 4.0 Yes
Application redhat ceph_storage 4.0 Yes
Application redhat ceph_storage 5.0 Yes
Application redhat ceph_storage_for_power 4.0 Yes
Operating System redhat enterprise_linux 8.0 No
Application redhat ceph_storage 4.0 Yes
Application redhat ceph_storage 5.0 Yes
Application redhat ceph_storage_for_power 4.0 Yes
Operating System redhat enterprise_linux 7.0 No
Operating System fedoraproject fedora 35 Yes
Operating System fedoraproject fedora 37 Yes

References