CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
Low
EPSS
Percentile
30.2%
Milan Broz discovered that cryptsetup incorrectly handled LUKS2
reencryption recovery. An attacker with physical access to modify the
encrypted device header may trigger the device to be unencrypted the next
time it is mounted by the user.
On Ubuntu 20.04 LTS, this issue was fixed by disabling the online
reencryption feature.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 21.10 | noarch | cryptsetup | < 2:2.3.7-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | cryptsetup-bin | < 2:2.3.7-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | cryptsetup-bin-dbgsym | < 2:2.3.7-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | cryptsetup-dbgsym | < 2:2.3.7-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | cryptsetup-initramfs | < 2:2.3.7-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | cryptsetup-run | < 2:2.3.7-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | libcryptsetup-dev | < 2:2.3.7-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | libcryptsetup12 | < 2:2.3.7-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | libcryptsetup12-dbgsym | < 2:2.3.7-0ubuntu0.21.10.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | cryptsetup | < 2:2.2.2-3ubuntu2.4 | UNKNOWN |