vulnerability
SUSE: CVE-2021-3979: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | Aug 25, 2022 | Oct 26, 2022 | Jan 28, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Aug 25, 2022
Added
Oct 26, 2022
Modified
Jan 28, 2025
Description
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Solutions
suse-upgrade-cephsuse-upgrade-ceph-basesuse-upgrade-ceph-commonsuse-upgrade-ceph-fusesuse-upgrade-ceph-grafana-dashboardssuse-upgrade-ceph-immutable-object-cachesuse-upgrade-ceph-mdssuse-upgrade-ceph-mgrsuse-upgrade-ceph-mgr-cephadmsuse-upgrade-ceph-mgr-dashboardsuse-upgrade-ceph-mgr-diskprediction-localsuse-upgrade-ceph-mgr-k8seventssuse-upgrade-ceph-mgr-modules-coresuse-upgrade-ceph-mgr-rooksuse-upgrade-ceph-monsuse-upgrade-ceph-osdsuse-upgrade-ceph-prometheus-alertssuse-upgrade-ceph-radosgwsuse-upgrade-ceph-testsuse-upgrade-cephadmsuse-upgrade-cephfs-mirrorsuse-upgrade-cephfs-shellsuse-upgrade-cephfs-topsuse-upgrade-libcephfs-develsuse-upgrade-libcephfs2suse-upgrade-libcephsqlitesuse-upgrade-libcephsqlite-develsuse-upgrade-libfmt8suse-upgrade-librados-develsuse-upgrade-librados2suse-upgrade-libradospp-develsuse-upgrade-librbd-develsuse-upgrade-librbd1suse-upgrade-librgw-develsuse-upgrade-librgw2suse-upgrade-python3-ceph-argparsesuse-upgrade-python3-ceph-commonsuse-upgrade-python3-cephfssuse-upgrade-python3-radossuse-upgrade-python3-rbdsuse-upgrade-python3-rgwsuse-upgrade-rados-objclass-develsuse-upgrade-rbd-fusesuse-upgrade-rbd-mirrorsuse-upgrade-rbd-nbd
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.