It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "cryptsetup",
"binary_version": "2:2.2.2-3ubuntu2.4"
},
{
"binary_name": "cryptsetup-bin",
"binary_version": "2:2.2.2-3ubuntu2.4"
},
{
"binary_name": "cryptsetup-initramfs",
"binary_version": "2:2.2.2-3ubuntu2.4"
},
{
"binary_name": "cryptsetup-run",
"binary_version": "2:2.2.2-3ubuntu2.4"
},
{
"binary_name": "libcryptsetup-dev",
"binary_version": "2:2.2.2-3ubuntu2.4"
},
{
"binary_name": "libcryptsetup12",
"binary_version": "2:2.2.2-3ubuntu2.4"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "cryptsetup",
"binary_version": "2:2.4.3-1ubuntu1"
},
{
"binary_name": "cryptsetup-bin",
"binary_version": "2:2.4.3-1ubuntu1"
},
{
"binary_name": "cryptsetup-initramfs",
"binary_version": "2:2.4.3-1ubuntu1"
},
{
"binary_name": "cryptsetup-run",
"binary_version": "2:2.4.3-1ubuntu1"
},
{
"binary_name": "cryptsetup-suspend",
"binary_version": "2:2.4.3-1ubuntu1"
},
{
"binary_name": "libcryptsetup-dev",
"binary_version": "2:2.4.3-1ubuntu1"
},
{
"binary_name": "libcryptsetup12",
"binary_version": "2:2.4.3-1ubuntu1"
}
]
}