[USN-5286-1] cryptsetup vulnerability

Marc Deslauriers marc.deslauriers at canonical.com
Tue Feb 15 17:04:18 UTC 2022


==========================================================================
Ubuntu Security Notice USN-5286-1
February 15, 2022

cryptsetup vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.10
- Ubuntu 20.04 LTS

Summary:

cryptsetup could be made to expose sensitive information.

Software Description:
- cryptsetup: disk encryption support

Details:

Milan Broz discovered that cryptsetup incorrectly handled LUKS2
reencryption recovery. An attacker with physical access to modify the
encrypted device header may trigger the device to be unencrypted the next
time it is mounted by the user.

On Ubuntu 20.04 LTS, this issue was fixed by disabling the online
reencryption feature.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.10:
  cryptsetup                      2:2.3.7-0ubuntu0.21.10.1

Ubuntu 20.04 LTS:
  cryptsetup                      2:2.2.2-3ubuntu2.4

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5286-1
  CVE-2021-4122

Package Information:
  https://launchpad.net/ubuntu/+source/cryptsetup/2:2.3.7-0ubuntu0.21.10.1
  https://launchpad.net/ubuntu/+source/cryptsetup/2:2.2.2-3ubuntu2.4
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20220215/82b6b7d4/attachment.sig>


More information about the ubuntu-security-announce mailing list