It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
| Software | From | Fixed in |
|---|---|---|
| cryptsetup_project / cryptsetup | 2.4.0 | 2.4.3 |
| cryptsetup_project / cryptsetup | - | 2.3.7 |