CVE-2021-3979

A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
VendorProductVersion
redhatceph_storage
3.0
redhatceph_storage
4.3
redhatceph_storage
5.1
redhatopenshift_container_storage
4.0
redhatopenshift_data_foundation
4.0
redhatopenstack_platform
13.0
redhatceph_storage_for_ibm_z_systems
4.0
redhatceph_storage
4.0
redhatceph_storage
5.0
redhatceph_storage_for_power
4.0
redhatceph_storage
4.0
redhatceph_storage
5.0
redhatceph_storage_for_power
4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ceph
bullseye
no-dsa
stretch
no-dsa
bookworm
16.2.11+ds-2
fixed
sid
18.2.4+ds-7
fixed
trixie
18.2.4+ds-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ceph
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
ignored
hirsute
ignored
focal
Fixed 15.2.17-0ubuntu0.20.04.3
released
bionic
Fixed 12.2.13-0ubuntu0.18.04.11
released
xenial
needs-triage
trusty
needs-triage