A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
2022-08-25T20:15:09.473
2024-11-21T06:23:17.720
Modified
CVSSv3.1: 6.5 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | ceph_storage | 3.0 | Yes |
Application | redhat | ceph_storage | 4.3 | Yes |
Application | redhat | ceph_storage | 5.1 | Yes |
Application | redhat | openshift_container_storage | 4.0 | Yes |
Application | redhat | openshift_data_foundation | 4.0 | Yes |
Application | redhat | openstack_platform | 13.0 | Yes |
Operating System | redhat | ceph_storage_for_ibm_z_systems | 4.0 | Yes |
Application | redhat | ceph_storage | 4.0 | Yes |
Application | redhat | ceph_storage | 5.0 | Yes |
Application | redhat | ceph_storage_for_power | 4.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | No |
Application | redhat | ceph_storage | 4.0 | Yes |
Application | redhat | ceph_storage | 5.0 | Yes |
Application | redhat | ceph_storage_for_power | 4.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | No |
Operating System | fedoraproject | fedora | 35 | Yes |
Operating System | fedoraproject | fedora | 37 | Yes |