Описание
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Ссылки
- Vendor Advisory
- Issue TrackingVendor Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Mailing List
- Issue TrackingVendor Advisory
- Vendor Advisory
- Issue TrackingVendor Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Mailing List
- Issue TrackingVendor Advisory
Уязвимые конфигурации
Одно из
Одновременно
Одно из
Одновременно
Одно из
Одно из
EPSS
6.5 Medium
CVSS3
Дефекты
Связанные уязвимости
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
A key length flaw was found in Red Hat Ceph Storage. An attacker can e ...
EPSS
6.5 Medium
CVSS3