It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5070-1 | cryptsetup security update |
EUVD |
EUVD-2021-33997 | It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium. |
Ubuntu USN |
USN-5286-1 | cryptsetup vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:16:04.245Z
Reserved: 2021-12-15T00:00:00
Link: CVE-2021-4122
No data.
Status : Modified
Published: 2022-08-24T16:15:09.427
Modified: 2024-11-21T06:36:56.853
Link: CVE-2021-4122
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN