Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-11568

Опубликовано: 15 окт. 2025
Источник: debian
EPSS Низкий

Описание

A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
luksmetafixed10-1package
luksmetafixed9-4+deb13u1trixiepackage
luksmetafixed9-4+deb12u1bookwormpackage
luksmetapostponedbullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2404244

  • https://github.com/latchset/luksmeta/pull/16

  • Fixed by: https://github.com/latchset/luksmeta/commit/017998805ddf98a482bb02fc1d0a09343baab2ca (v10)

EPSS

Процентиль: 3%
0.00016
Низкий

Связанные уязвимости

CVSS3: 4.4
ubuntu
4 месяца назад

A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.

CVSS3: 4.4
nvd
4 месяца назад

A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.

rocky
около 2 месяцев назад

Moderate: luksmeta security update

CVSS3: 4.4
github
4 месяца назад

A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.

oracle-oval
около 2 месяцев назад

ELSA-2025-23086: luksmeta security update (MODERATE)

EPSS

Процентиль: 3%
0.00016
Низкий