vulnerability
Red Hat: CVE-2021-3979: Moderate: Red Hat Ceph Storage 5.1 Security, Enhancement, and Bug Fix update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | 2022-04-04 | 2022-04-05 | 2025-01-28 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
2022-04-04
Added
2022-04-05
Modified
2025-01-28
Description
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Solution(s)
redhat-upgrade-ceph-ansibleredhat-upgrade-ceph-baseredhat-upgrade-ceph-base-debuginforedhat-upgrade-ceph-commonredhat-upgrade-ceph-common-debuginforedhat-upgrade-ceph-debuginforedhat-upgrade-ceph-debugsourceredhat-upgrade-ceph-fuseredhat-upgrade-ceph-fuse-debuginforedhat-upgrade-ceph-grafana-dashboardsredhat-upgrade-ceph-immutable-object-cacheredhat-upgrade-ceph-immutable-object-cache-debuginforedhat-upgrade-ceph-iscsiredhat-upgrade-ceph-mdsredhat-upgrade-ceph-mds-debuginforedhat-upgrade-ceph-mgr-debuginforedhat-upgrade-ceph-mon-debuginforedhat-upgrade-ceph-osd-debuginforedhat-upgrade-ceph-radosgwredhat-upgrade-ceph-radosgw-debuginforedhat-upgrade-ceph-resource-agentsredhat-upgrade-ceph-selinuxredhat-upgrade-ceph-test-debuginforedhat-upgrade-cephadmredhat-upgrade-cephadm-ansibleredhat-upgrade-cephfs-mirrorredhat-upgrade-cephfs-mirror-debuginforedhat-upgrade-cephfs-topredhat-upgrade-libcephfs-develredhat-upgrade-libcephfs2redhat-upgrade-libcephfs2-debuginforedhat-upgrade-libcephsqlite-debuginforedhat-upgrade-libntirpcredhat-upgrade-libntirpc-debuginforedhat-upgrade-libntirpc-debugsourceredhat-upgrade-librados-develredhat-upgrade-librados-devel-debuginforedhat-upgrade-libradospp-develredhat-upgrade-libradosstriper1redhat-upgrade-libradosstriper1-debuginforedhat-upgrade-librbd-develredhat-upgrade-librgw-develredhat-upgrade-librgw2redhat-upgrade-librgw2-debuginforedhat-upgrade-libtcmuredhat-upgrade-nfs-ganesharedhat-upgrade-nfs-ganesha-cephredhat-upgrade-nfs-ganesha-ceph-debuginforedhat-upgrade-nfs-ganesha-debuginforedhat-upgrade-nfs-ganesha-debugsourceredhat-upgrade-nfs-ganesha-proxyredhat-upgrade-nfs-ganesha-proxy-debuginforedhat-upgrade-nfs-ganesha-rados-graceredhat-upgrade-nfs-ganesha-rados-grace-debuginforedhat-upgrade-nfs-ganesha-rados-urlsredhat-upgrade-nfs-ganesha-rados-urls-debuginforedhat-upgrade-nfs-ganesha-rgwredhat-upgrade-nfs-ganesha-rgw-debuginforedhat-upgrade-nfs-ganesha-selinuxredhat-upgrade-nfs-ganesha-vfsredhat-upgrade-nfs-ganesha-vfs-debuginforedhat-upgrade-python-ceph-argparseredhat-upgrade-python-cephfsredhat-upgrade-python-rgwredhat-upgrade-python3-ceph-argparseredhat-upgrade-python3-ceph-commonredhat-upgrade-python3-cephfsredhat-upgrade-python3-cephfs-debuginforedhat-upgrade-python3-radosredhat-upgrade-python3-rados-debuginforedhat-upgrade-python3-rbdredhat-upgrade-python3-rbd-debuginforedhat-upgrade-python3-rgwredhat-upgrade-python3-rgw-debuginforedhat-upgrade-rbd-fuse-debuginforedhat-upgrade-rbd-mirrorredhat-upgrade-rbd-mirror-debuginforedhat-upgrade-rbd-nbdredhat-upgrade-rbd-nbd-debuginforedhat-upgrade-tcmu-runner
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.