Lucene search

K
ubuntuUbuntuUSN-5286-1
HistoryFeb 15, 2022 - 12:00 a.m.

cryptsetup vulnerability

2022-02-1500:00:00
ubuntu.com
100

4.3 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

5.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

30.2%

Releases

  • Ubuntu 21.10
  • Ubuntu 20.04 LTS

Packages

  • cryptsetup - disk encryption support

Details

Milan Broz discovered that cryptsetup incorrectly handled LUKS2
reencryption recovery. An attacker with physical access to modify the
encrypted device header may trigger the device to be unencrypted the next
time it is mounted by the user.

On Ubuntu 20.04 LTS, this issue was fixed by disabling the online
reencryption feature.

OSVersionArchitecturePackageVersionFilename
Ubuntu21.10noarchcryptsetup< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-bin< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-bin-dbgsym< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-dbgsym< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-initramfs< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchcryptsetup-run< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchlibcryptsetup-dev< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchlibcryptsetup12< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu21.10noarchlibcryptsetup12-dbgsym< 2:2.3.7-0ubuntu0.21.10.1UNKNOWN
Ubuntu20.04noarchcryptsetup< 2:2.2.2-3ubuntu2.4UNKNOWN
Rows per page:
1-10 of 201

4.3 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

5.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

30.2%