Описание
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Отчет
Red Hat OpenStack Platform deployments use the ceph package directly from the Ceph channel; the RHOSP package will not be updated at this time.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Ceph Storage 3 | ceph | Out of support scope | ||
Red Hat Enterprise Linux 7 | ceph-common | Not affected | ||
Red Hat Enterprise Linux 8 | ceph | Not affected | ||
Red Hat Enterprise Linux 9 | ceph | Not affected | ||
Red Hat Openshift Container Storage 4 | ceph | Out of support scope | ||
Red Hat Openshift Data Foundation 4 | ceph | Will not fix | ||
Red Hat OpenStack Platform 13 (Queens) | ceph | Will not fix | ||
Red Hat Ceph Storage 4.3 | ceph | Fixed | RHSA-2022:1716 | 05.05.2022 |
Red Hat Ceph Storage 5.1 | ceph | Fixed | RHSA-2022:1174 | 04.04.2022 |
Показывать по
Дополнительная информация
Статус:
6.5 Medium
CVSS3
Связанные уязвимости
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
A key length flaw was found in Red Hat Ceph Storage. An attacker can e ...
6.5 Medium
CVSS3