[pkg-cryptsetup-devel] Security issue (CVE-2021-4122) in cryptsetup 2:2.3.5-1

Yves-Alexis Perez corsac at debian.org
Thu Feb 10 15:36:53 GMT 2022


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On Thu, 2022-02-10 at 15:59 +0100, Christoph Anton Mitterer wrote:
> On Thu, 2022-02-10 at 15:54 +0100, Yves-Alexis Perez wrote:
> > Yeah no problem, I'll craft something from the various sources :)
> 
> If you haven't seen it, yet:
> Ondrej Kozina explained some things about the attack to me in detail in
> the following thread:
> 
> https://lore.kernel.org/dm-crypt/005d7ce6-161e-c00d-2317-efd88095175d@gmail.com/T/#t
> 
> Maybe that helps to better describe the attack.

Thanks for the pointer. As far as I understand it, every time an attacker
modifies the LUKS2 header and the device is activated (at boot for example) by
the legitimate user, a hotzone can be decrypted (~3GiB with default LUKS2
parameters). With repeated access one could decrypt the whole disk but it
would be more visible.

Regards,
- -- 
Yves-Alexis
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmIFMRUACgkQ3rYcyPpX
RFvRmgf/d15nmKqBvD9AZhSHsoUhPjpbY4yiM/6+Ub5S51TWRR1mXXO13XR9o7+8
NXG9RuXvfBV8xWfOBv9zh/SnZk7nGz+FqPyVqiuWZaoRkoddJr1WLRS534DoYAR+
3Vz2Gr7Yo8SC5MdeXC4gzi51tzv6ViPP3Us6X+WCUsQiqokwmXDZHYYsAonqIeht
2dZuMLBiHtbWSs6SJv4VQHCbdc84DYYvKkm+naP3IP8vMAdt4D+seTrzV1papsSZ
tMSLCC1/dkujxvopwcGVY/S5Qk2xMq78K7FnbG7a8K58CUPaAiRhUf5gaK8DnZTT
z5LKpae0BBo1bS/+i0NZnC3bYbNLbA==
=ZZig
-----END PGP SIGNATURE-----



More information about the pkg-cryptsetup-devel mailing list