Milan Broz discovered that cryptsetup incorrectly handled LUKS2 reencryption recovery. An attacker with physical access to modify the encrypted device header may trigger the device to be unencrypted the next time it is mounted by the user.
On Ubuntu 20.04 LTS, this issue was fixed by disabling the online reencryption feature.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "cryptsetup" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "cryptsetup-bin" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "cryptsetup-bin-dbgsym" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "cryptsetup-dbgsym" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "cryptsetup-initramfs" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "cryptsetup-run" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "cryptsetup-udeb" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "libcryptsetup-dev" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "libcryptsetup12" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "libcryptsetup12-dbgsym" }, { "binary_version": "2:2.2.2-3ubuntu2.4", "binary_name": "libcryptsetup12-udeb" } ] }