It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "cryptsetup", "binary_version": "2:2.2.2-3ubuntu2.4" }, { "binary_name": "cryptsetup-bin", "binary_version": "2:2.2.2-3ubuntu2.4" }, { "binary_name": "cryptsetup-initramfs", "binary_version": "2:2.2.2-3ubuntu2.4" }, { "binary_name": "cryptsetup-run", "binary_version": "2:2.2.2-3ubuntu2.4" }, { "binary_name": "libcryptsetup-dev", "binary_version": "2:2.2.2-3ubuntu2.4" }, { "binary_name": "libcryptsetup12", "binary_version": "2:2.2.2-3ubuntu2.4" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "cryptsetup", "binary_version": "2:2.4.3-1ubuntu1" }, { "binary_name": "cryptsetup-bin", "binary_version": "2:2.4.3-1ubuntu1" }, { "binary_name": "cryptsetup-initramfs", "binary_version": "2:2.4.3-1ubuntu1" }, { "binary_name": "cryptsetup-run", "binary_version": "2:2.4.3-1ubuntu1" }, { "binary_name": "cryptsetup-suspend", "binary_version": "2:2.4.3-1ubuntu1" }, { "binary_name": "libcryptsetup-dev", "binary_version": "2:2.4.3-1ubuntu1" }, { "binary_name": "libcryptsetup12", "binary_version": "2:2.4.3-1ubuntu1" } ] }