Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-23086

Опубликовано: 10 дек. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-23086: luksmeta security update (MODERATE)

[9-4.1]

  • Fix handling of large metadata Resolves: RHEL-122138

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

libluksmeta

9-4.el8_10.1

libluksmeta-devel

9-4.el8_10.1

luksmeta

9-4.el8_10.1

Oracle Linux x86_64

libluksmeta

9-4.el8_10.1

libluksmeta-devel

9-4.el8_10.1

luksmeta

9-4.el8_10.1

Связанные CVE

Связанные уязвимости

CVSS3: 4.4
ubuntu
4 месяца назад

A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.

CVSS3: 4.4
nvd
4 месяца назад

A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.

CVSS3: 4.4
debian
4 месяца назад

A data corruption vulnerability has been identified in the luksmeta ut ...

rocky
около 2 месяцев назад

Moderate: luksmeta security update

CVSS3: 4.4
github
4 месяца назад

A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.