A key length flaw was found in Red Hat Ceph Storage. An...
Moderate severity
Unreviewed
Published
Aug 26, 2022
to the GitHub Advisory Database
•
Updated Nov 1, 2023
Description
Published by the National Vulnerability Database
Aug 25, 2022
Published to the GitHub Advisory Database
Aug 26, 2022
Last updated
Nov 1, 2023
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
References