{"id":"CVE-2021-4122","details":"It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.","modified":"2026-04-09T08:15:35.911076Z","published":"2022-08-24T16:15:09.427Z","related":["ALSA-2022:0370","MGASA-2022-0047","SUSE-SU-2022:0144-1","openSUSE-SU-2022:0144-1","openSUSE-SU-2024:11754-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2021-4122"},{"type":"ADVISORY","url":"https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.4/v2.4.3-ReleaseNotes"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031859"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2032401"},{"type":"FIX","url":"https://gitlab.com/cryptsetup/cryptsetup/-/commit/0113ac2d889c5322659ad0596d4cfc6da53e356c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/cryptsetup/cryptsetup","events":[{"introduced":"0"},{"fixed":"1fae09d6077183dbddc79f914ab9cf65eb4a9ced"},{"introduced":"0f8e7f317f9b2daa4c4f8ef10e2dae8fcac9479b"},{"fixed":"c67861e875896399120c690b65bd8a5312290da1"},{"fixed":"0113ac2d889c5322659ad0596d4cfc6da53e356c"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.3.7"},{"introduced":"2.4.0"},{"fixed":"2.4.3"}]}}],"versions":["v1_4_2","v1_5_0","v1_5_1","v1_6_0","v1_6_1","v1_6_2","v1_6_3","v1_6_4","v1_6_5","v1_6_6","v1_6_7","v1_6_8","v1_7_0","v2.0.0","v2.0.0-rc0","v2.0.0-rc1","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.1.0","v2.2.0","v2.2.0-rc0","v2.2.0-rc1","v2.2.1","v2.2.2","v2.3.0","v2.3.0-rc0","v2.3.1","v2.3.2","v2.3.3","v2.3.4","v2.3.5","v2.3.5-rc0","v2.3.6","v2.4.0","v2.4.1","v2.4.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-4122.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}