Количество 8
Количество 8
CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can e ...
SUSE-SU-2022:4501-1
Security update for ceph
SUSE-SU-2022:2818-1
Security update for ceph
GHSA-23g5-cwwr-8xhw
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
BDU:2024-07305
Уязвимость системы хранения данных Ceph, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-3979 A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3979 A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks. | CVSS3: 6.5 | 0% Низкий | почти 4 года назад | |
CVE-2021-3979 A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3979 A key length flaw was found in Red Hat Ceph Storage. An attacker can e ... | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2022:4501-1 Security update for ceph | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:2818-1 Security update for ceph | 0% Низкий | больше 3 лет назад | ||
GHSA-23g5-cwwr-8xhw A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
BDU:2024-07305 Уязвимость системы хранения данных Ceph, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность | CVSS3: 6.5 | 0% Низкий | около 4 лет назад |
Уязвимостей на страницу