DescriptionIt was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1003686

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cryptsetup (PTS)buster2:2.1.0-5+deb10u2fixed
bullseye (security), bullseye2:2.3.7-1+deb11u1fixed
sid, trixie2:2.7.2-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cryptsetupsourcestretch(not affected)
cryptsetupsourcebuster(not affected)


[buster] - cryptsetup <not-affected> (Vulnerable code not present; does not support online LUKS2 reencryption)
[stretch] - cryptsetup <not-affected> (Vulnerable code not present; does not support LUKS2)
2.4 branch:
2.3 branch:

Search for package or bug name: Reporting problems