Bug 29884 - cryptsetup new security issue CVE-2021-4122
Summary: cryptsetup new security issue CVE-2021-4122
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2022-01-13 17:07 CET by David Walser
Modified: 2022-02-03 21:30 CET (History)
7 users (show)

See Also:
Source RPM: cryptsetup-2.4.2-1.mga9.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2022-01-13 17:07:40 CET
A security issue fixed upstream in cryptsetup has been announced today (January 13):
https://www.openwall.com/lists/oss-security/2022/01/13/2

The issue is fixed upstream in 2.3.7 and 2.4.3.

Mageia 8 is also affected.
David Walser 2022-01-13 17:07:57 CET

Status comment: (none) => Fixed upstream in 2.3.7 and 2.4.3
Whiteboard: (none) => MGA8TOO

David Walser 2022-01-13 17:09:36 CET

Summary: cryptsetup-2.4.2-1.mga9.src.rpm => cryptsetup new security issue CVE-2021-4122
Source RPM: (none) => cryptsetup-2.4.2-1.mga9.src.rpm

Comment 1 Lewis Smith 2022-01-13 19:23:35 CET
Looks best to assign this to tv.

Assignee: bugsquad => thierry.vignaud

Comment 2 David Walser 2022-01-16 17:04:27 CET
Fedora has issued an advisory for this today (January 16):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/Q3X2XSITPE2AHKJ5OODUTHFKESE6BZPY/
Comment 3 David Walser 2022-01-17 18:12:20 CET
cryptsetup-2.4.3-1.mga9 uploaded for Cauldron by Mike.

Version: Cauldron => 8
CC: (none) => mrambo
Whiteboard: MGA8TOO => (none)

Comment 4 David Walser 2022-01-21 19:37:23 CET
openSUSE has issued an advisory for this on January 20:
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILTMKWZNQBSX2H2MPF3XKXVDEDPDYAIB/
Comment 5 Mike Rambo 2022-01-29 02:36:03 CET
Updated package uploaded for Mageia 8.

Advisory:
========================

Updated cryptsetup package fixes security vulnerability:

An attacker can modify on-disk metadata to simulate decryption in
progress with crashed (unfinished) reencryption step and persistently
decrypt part of the LUKS device (CVE-2021-4122).

References:
https://www.openwall.com/lists/oss-security/2022/01/13/2
========================

Updated packages in core/updates_testing:
========================
cryptsetup-2.3.7-1.mga8.x86_64.rpm
lib64cryptsetup12-2.3.7-1.mga8.x86_64.rpm
lib64cryptsetup-devel-2.3.7-1.mga8.x86_64.rpm

from cryptsetup-2.3.7-1.mga8.src.rpm

Assignee: thierry.vignaud => qa-bugs

David Walser 2022-01-29 04:07:07 CET

Status comment: Fixed upstream in 2.3.7 and 2.4.3 => (none)

Comment 6 Herman Viaene 2022-01-29 14:54:25 CET
MGA8-64 Plasma on Lenovo B50 in Dutch
No installation issues
# cryptsetup -V
cryptsetup 2.3.7
Tried to read the man pages, but that's not in my league. Same goes for https://www.thegeekstuff.com/2016/03/cryptsetup-lukskey/.
Leaving for someone else

CC: (none) => herman.viaene

Ulrich Beckmann 2022-02-02 18:50:51 CET

CC: (none) => bequimao.de

Comment 7 Brian Rockwell 2022-02-02 19:41:31 CET
The following 2 packages are going to be installed:

- cryptsetup-2.3.7-1.mga8.x86_64
- lib64cryptsetup12-2.3.7-1.mga8.x86_64


--- I'm going to encrypt a usb drive

following instructions in https://linuxhint.com/encrypt-data-usb-linux/


# umount /dev/sdb1
# cryptsetup --verbose --verify-passphrase luksFormat /dev/sdb

YES
enter your passphrase, etc.
--

now open the drive

# cryptsetup luksOpen /dev/sdb luksdrive

format drive - I recommend using gparted


to make it really work after formatting and mounting the drive I ended changing the owner of the mount to my user-id.

This allowed me to save files to the drive.

Whiteboard: (none) => MGA8-64-OK
CC: (none) => brtians1

Comment 8 Ulrich Beckmann 2022-02-02 22:02:02 CET
I have a LUKS-encrypted /home on my test instance.

No regression found.
Comment 9 Thomas Andrews 2022-02-02 22:08:11 CET
Validating. Advisory in Comment 5.
Thomas Andrews 2022-02-02 22:09:08 CET

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Dave Hodgins 2022-02-03 20:45:53 CET

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 10 Mageia Robot 2022-02-03 21:30:41 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2022-0047.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.