First published: Tue Dec 14 2021(Updated: )
It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cryptsetup Project Cryptsetup | <2.3.7 | |
Cryptsetup Project Cryptsetup | >=2.4.0<2.4.3 | |
redhat/cryptsetup | <2.4.3 | 2.4.3 |
redhat/cryptsetup | <2.3.7 | 2.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4122 is a vulnerability found in cryptsetup that allows an attacker with physical access to a device to disable encryption.
A specially crafted LUKS header can trick cryptsetup into disabling encryption during device recovery.
CVE-2021-4122 has a severity rating of medium with a CVSS score of 4.3.
Versions up to and including cryptsetup 2.3.7 and versions between 2.4.0 and 2.4.3 are affected.
Update cryptsetup to version 2.4.3 or 2.3.7 depending on the currently installed version.