A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
CPE | Name | Operator | Version |
---|---|---|---|
fedora | eq | 35 | |
fedora | eq | 37 | |
ceph_storage | eq | 3.0 | |
ceph_storage | eq | 4.3 | |
ceph_storage | eq | 5.1 | |
ceph_storage | eq | 4.0 | |
ceph_storage | eq | 5.0 | |
ceph_storage | eq | 4.0 | |
ceph_storage | eq | 5.0 | |
ceph_storage_for_ibm_z_systems | eq | 4.0 |
access.redhat.com/security/cve/CVE-2021-3979
bugzilla.redhat.com/show_bug.cgi?id=2024788
github.com/ceph/ceph/commit/47c33179f9a15ae95cc1579a421be89378602656
github.com/ceph/ceph/pull/44765
lists.debian.org/debian-lts-announce/2023/10/msg00034.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/
tracker.ceph.com/issues/54006