Total vulnerabilities in the database
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Software | From | Fixed in |
---|---|---|
redhat / ceph_storage | 3.0 | 3.0.x |
redhat / openstack_platform | 13.0 | 13.0.x |
redhat / openshift_container_storage | 4.0 | 4.0.x |
redhat / openshift_data_foundation | 4.0 | 4.0.x |
redhat / ceph_storage_for_ibm_z_systems | 4.0 | 4.0.x |
redhat / ceph_storage | 4.3 | 4.3.x |
redhat / ceph_storage | 5.1 | 5.1.x |
redhat / ceph_storage | 4.0 | 4.0.x |
redhat / ceph_storage | 5.0 | 5.0.x |
redhat / ceph_storage_for_power | 4.0 | 4.0.x |
fedoraproject / fedora | 35 | 35.x |
fedoraproject / fedora | 37 | 37.x |