Описание
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
ceph | fixed | 16.2.9+ds-1 | package | |
ceph | no-dsa | bullseye | package | |
ceph | no-dsa | stretch | package |
Примечания
https://www.openwall.com/lists/oss-security/2022/01/11/5
https://tracker.ceph.com/issues/54006
https://github.com/ceph/ceph/commit/47c33179f9a15ae95cc1579a421be89378602656 (main)
https://github.com/ceph/ceph/commit/f69339e00f582ec64b843ff58b66817975fca0d7 (v16.2.8)
EPSS
Связанные уязвимости
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
EPSS