Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2022:370

Опубликовано: 02 фев. 2022
Источник: rocky
Оценка: Moderate

Описание

Moderate: cryptsetup security update

For more information visit https://errata.rockylinux.org/RLSA-2022:370

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
cryptsetupx86_644.el8_5.1cryptsetup-2.3.3-4.el8_5.1.x86_64.rpm
cryptsetup-libsi6864.el8_5.1cryptsetup-libs-2.3.3-4.el8_5.1.i686.rpm
cryptsetup-libsx86_644.el8_5.1cryptsetup-libs-2.3.3-4.el8_5.1.x86_64.rpm
cryptsetup-reencryptx86_644.el8_5.1cryptsetup-reencrypt-2.3.3-4.el8_5.1.x86_64.rpm
integritysetupx86_644.el8_5.1integritysetup-2.3.3-4.el8_5.1.x86_64.rpm
veritysetupx86_644.el8_5.1veritysetup-2.3.3-4.el8_5.1.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 4.3
ubuntu
почти 3 года назад

It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.

CVSS3: 5.9
redhat
больше 3 лет назад

It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.

CVSS3: 4.3
nvd
почти 3 года назад

It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.

CVSS3: 4.3
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 4.3
debian
почти 3 года назад

It was found that a specially crafted LUKS header could trick cryptset ...