Fedora 37 update for ceph



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-3979
CWE-ID CWE-327
Exploitation vector Local
Public exploit N/A
Vulnerable software
Fedora
Operating systems & Components / Operating system

ceph
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use of a broken or risky cryptographic algorithm

EUVDB-ID: #VU66551

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-3979

CWE-ID: CWE-327 - Use of a Broken or Risky Cryptographic Algorithm

Exploit availability: No

Description

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to Ceph volume does not the honour osd_dmcrypt_key_size, resulting in the key length is being incorrectly passed in an encryption algorithm to create a non random key. An attacker with physical access to encrypted device can decrypt data and gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 37

ceph: before 17.2.4-1.fc37

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2022-14b272d7f4


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###