发布时间: 2022年2月19日
修改时间: 2024年10月31日
It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
NVD | openEuler | |
---|---|---|
Confidentiality | None | High |
Attack Vector | Physical | Physical |
CVSS评分 | 4.3 | 5.9 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | High | High |
User Interaction | Required | Required |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-1047 | cryptsetup security update | 2022年2月19日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | cryptsetup | Fixed |
KY3.4-5A | cryptsetup | Fixed |