Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2022:0370

Опубликовано: 01 фев. 2022
Источник: rocky
Оценка: Moderate

Описание

Moderate: cryptsetup security update

The cryptsetup packages provide a utility for setting up disk encryption using the dm-crypt kernel module.

Security Fix(es):

  • cryptsetup: disable encryption via header rewrite (CVE-2021-4122)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
cryptsetupx86_644.el8_5.1cryptsetup-2.3.3-4.el8_5.1.x86_64.rpm
cryptsetup-libsi6864.el8_5.1cryptsetup-libs-2.3.3-4.el8_5.1.i686.rpm
cryptsetup-libsx86_644.el8_5.1cryptsetup-libs-2.3.3-4.el8_5.1.x86_64.rpm
cryptsetup-reencryptx86_644.el8_5.1cryptsetup-reencrypt-2.3.3-4.el8_5.1.x86_64.rpm
integritysetupx86_644.el8_5.1integritysetup-2.3.3-4.el8_5.1.x86_64.rpm
veritysetupx86_644.el8_5.1veritysetup-2.3.3-4.el8_5.1.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 3 лет назад

It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.

CVSS3: 5.9
redhat
около 4 лет назад

It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.

CVSS3: 4.3
nvd
больше 3 лет назад

It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.

CVSS3: 4.3
msrc
больше 3 лет назад

It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium such as a flash disk could use this flaw to force a user into permanently disabling the encryption layer of that medium.

CVSS3: 4.3
debian
больше 3 лет назад

It was found that a specially crafted LUKS header could trick cryptset ...