DEBIAN-CVE-2020-14382

Source
https://security-tracker.debian.org/tracker/CVE-2020-14382
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-14382.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2020-14382
Upstream
Published
2020-09-16T15:15:12Z
Modified
2025-09-30T03:54:22Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in file 'lib/luks2/luks2jsonmetadata.c' in function hdrvalidatesegments(struct cryptdevice *cd, jsonobject hdr_jobj) where the code does not check for possible overflow on memory allocation used for intervals array (see statement "intervals = malloc(first_backup * sizeof(intervals));"). Due to the bug, library can be tricked to expect such allocation was successful but for far less memory then originally expected. Later it may read data FROM image crafted by an attacker and actually write such data BEYOND allocated memory.

References

Affected packages

Debian:11 / cryptsetup

Package

Name
cryptsetup
Purl
pkg:deb/debian/cryptsetup?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.3.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / cryptsetup

Package

Name
cryptsetup
Purl
pkg:deb/debian/cryptsetup?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.3.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / cryptsetup

Package

Name
cryptsetup
Purl
pkg:deb/debian/cryptsetup?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.3.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / cryptsetup

Package

Name
cryptsetup
Purl
pkg:deb/debian/cryptsetup?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.3.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}