Bug 27927 - cryptsetup security issue CVE-2020-14382
Summary: cryptsetup security issue CVE-2020-14382
Status: RESOLVED INVALID
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Mageia Bug Squad
QA Contact: Sec team
URL: https://nvd.nist.gov/vuln/detail/CVE-...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2020-12-26 11:31 CET by Zombie Ryushu
Modified: 2020-12-26 16:57 CET (History)
0 users

See Also:
Source RPM: cryptsetup-2.1.0-1.mga7.src
CVE: CVE-2020-14382
Status comment:


Attachments

Description Zombie Ryushu 2020-12-26 11:31:30 CET
A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in file 'lib/luks2/luks2_json_metadata.c' in function hdr_validate_segments(struct crypt_device *cd, json_object *hdr_jobj) where the code does not check for possible overflow on memory allocation used for intervals array (see statement "intervals = malloc(first_backup * sizeof(*intervals));"). Due to the bug, library can be *tricked* to expect such allocation was successful but for far less memory then originally expected. Later it may read data FROM image crafted by an attacker and actually write such data BEYOND allocated memory.
Zombie Ryushu 2020-12-26 11:31:43 CET

CVE: (none) => CVE-2020-14382

Comment 1 David Walser 2020-12-26 16:57:44 CET
Mageia 7 is not affected.

Status: NEW => RESOLVED
Resolution: (none) => INVALID


Note You need to log in before you can comment on or make changes to this bug.