It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2:2.2.2-3ubuntu2.4",
"binary_name": "cryptsetup"
},
{
"binary_version": "2:2.2.2-3ubuntu2.4",
"binary_name": "cryptsetup-bin"
},
{
"binary_version": "2:2.2.2-3ubuntu2.4",
"binary_name": "cryptsetup-initramfs"
},
{
"binary_version": "2:2.2.2-3ubuntu2.4",
"binary_name": "cryptsetup-run"
},
{
"binary_version": "2:2.2.2-3ubuntu2.4",
"binary_name": "libcryptsetup-dev"
},
{
"binary_version": "2:2.2.2-3ubuntu2.4",
"binary_name": "libcryptsetup12"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2:2.4.3-1ubuntu1",
"binary_name": "cryptsetup"
},
{
"binary_version": "2:2.4.3-1ubuntu1",
"binary_name": "cryptsetup-bin"
},
{
"binary_version": "2:2.4.3-1ubuntu1",
"binary_name": "cryptsetup-initramfs"
},
{
"binary_version": "2:2.4.3-1ubuntu1",
"binary_name": "cryptsetup-run"
},
{
"binary_version": "2:2.4.3-1ubuntu1",
"binary_name": "cryptsetup-suspend"
},
{
"binary_version": "2:2.4.3-1ubuntu1",
"binary_name": "libcryptsetup-dev"
},
{
"binary_version": "2:2.4.3-1ubuntu1",
"binary_name": "libcryptsetup12"
}
]
}