Lucene search

K
ubuntuUbuntuUSN-5286-1
HistoryFeb 15, 2022 - 12:00 a.m.

cryptsetup vulnerability

2022-02-1500:00:00
ubuntu.com
114
ubuntu
cryptsetup
disk encryption
luks2
reencryption
recovery
physical access

CVSS3

4.3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

5.3

Confidence

Low

EPSS

0.001

Percentile

30.2%

Releases

  • Ubuntu 21.10
  • Ubuntu 20.04 LTS

Packages

  • cryptsetup - disk encryption support

Details

Milan Broz discovered that cryptsetup incorrectly handled LUKS2
reencryption recovery. An attacker with physical access to modify the
encrypted device header may trigger the device to be unencrypted the next
time it is mounted by the user.

On Ubuntu 20.04 LTS, this issue was fixed by disabling the online
reencryption feature.

OSVersionArchitecturePackageVersionFilename
Ubuntu21.10noarchcryptsetup< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-bin< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-bin-dbgsym< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-dbgsym< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-initramfs< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-run< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchlibcryptsetup-dev< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchlibcryptsetup12< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchlibcryptsetup12-dbgsym< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu20.04noarchcryptsetup< 2:2.2.2-3ubuntu2.4UNKNOWN
Rows per page:
1-10 of 201

CVSS3

4.3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

5.3

Confidence

Low

EPSS

0.001

Percentile

30.2%