Количество 8
Количество 8

BDU:2024-07305
Уязвимость системы хранения данных Ceph, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.

CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.

CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can e ...

SUSE-SU-2022:4501-1
Security update for ceph

SUSE-SU-2022:2818-1
Security update for ceph
GHSA-23g5-cwwr-8xhw
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-07305 Уязвимость системы хранения данных Ceph, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3979 A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks. | CVSS3: 6.5 | 0% Низкий | почти 3 года назад |
![]() | CVE-2021-3979 A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3979 A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks. | CVSS3: 6.5 | 0% Низкий | почти 3 года назад |
CVE-2021-3979 A key length flaw was found in Red Hat Ceph Storage. An attacker can e ... | CVSS3: 6.5 | 0% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:4501-1 Security update for ceph | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:2818-1 Security update for ceph | 0% Низкий | почти 3 года назад | |
GHSA-23g5-cwwr-8xhw A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks. | CVSS3: 6.5 | 0% Низкий | почти 3 года назад |
Уязвимостей на страницу