Описание
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 12.2.13-0ubuntu0.18.04.11 |
| devel | not-affected | 17.2.0-0ubuntu1 |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/bionic | released | 12.2.13-0ubuntu0.18.04.11 |
| esm-infra/focal | released | 15.2.17-0ubuntu0.20.04.3 |
| esm-infra/xenial | not-affected | code not present |
| focal | released | 15.2.17-0ubuntu0.20.04.3 |
| hirsute | ignored | end of life |
| impish | ignored | end of life |
| jammy | not-affected | 17.1.0-0ubuntu3 |
Показывать по
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
A key length flaw was found in Red Hat Ceph Storage. An attacker can e ...
EPSS
6.5 Medium
CVSS3