A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat ceph storage 3.0 |
||
redhat openstack platform 13.0 |
||
redhat openshift container storage 4.0 |
||
redhat openshift data foundation 4.0 |
||
redhat ceph storage for ibm z systems 4.0 |
||
redhat ceph storage 4.3 |
||
redhat ceph storage 5.1 |
||
redhat ceph_storage 4.0 |
||
redhat ceph_storage 5.0 |
||
redhat ceph_storage_for_power 4.0 |
||
fedoraproject fedora 35 |
||
fedoraproject fedora 37 |