Описание
A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.
Отчет
This vulnerability has been rated as having the impact of 'Moderate' by the Red Hat Product Security team. This happens because for an successful attack to take place, the attacker needs to have root privileges to me able to run luksmeta. It worth to notice this vulnerability only affects luksmeta when it's being used over a encrypted partition with LUKS1 versio, further LUKS versions are not vulnerable to this. While LUKS1 is not the default LUKS version in Red Hat Enterprise Linux since Red Hat Enterprise Linux 8, LUKS1 is still supported.
Меры по смягчению последствий
There's no available mitigation for this vulnerability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | luksmeta | Affected | ||
| Red Hat Enterprise Linux 7 | luksmeta | Fix deferred | ||
| Red Hat Enterprise Linux 9 | luksmeta | Affected | ||
| Red Hat OpenShift Container Platform 4 | rhcos | Fix deferred | ||
| Red Hat Enterprise Linux 8 | luksmeta | Fixed | RHSA-2025:23086 | 11.12.2025 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.4 Medium
CVSS3
Связанные уязвимости
A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.
A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.
A data corruption vulnerability has been identified in the luksmeta ut ...
A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.
EPSS
4.4 Medium
CVSS3