[USN-5286-1] cryptsetup vulnerability
Marc Deslauriers
marc.deslauriers at canonical.com
Tue Feb 15 17:04:18 UTC 2022
==========================================================================
Ubuntu Security Notice USN-5286-1
February 15, 2022
cryptsetup vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.10
- Ubuntu 20.04 LTS
Summary:
cryptsetup could be made to expose sensitive information.
Software Description:
- cryptsetup: disk encryption support
Details:
Milan Broz discovered that cryptsetup incorrectly handled LUKS2
reencryption recovery. An attacker with physical access to modify the
encrypted device header may trigger the device to be unencrypted the next
time it is mounted by the user.
On Ubuntu 20.04 LTS, this issue was fixed by disabling the online
reencryption feature.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 21.10:
cryptsetup 2:2.3.7-0ubuntu0.21.10.1
Ubuntu 20.04 LTS:
cryptsetup 2:2.2.2-3ubuntu2.4
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5286-1
CVE-2021-4122
Package Information:
https://launchpad.net/ubuntu/+source/cryptsetup/2:2.3.7-0ubuntu0.21.10.1
https://launchpad.net/ubuntu/+source/cryptsetup/2:2.2.2-3ubuntu2.4
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20220215/82b6b7d4/attachment.sig>
More information about the ubuntu-security-announce
mailing list