Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
Permalink CVE-2025-11568
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
Luksmeta: data corruption when handling luks1 partitions with luksmeta

A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.

References

Affected products

rhcos
luksmeta
  • <10
  • *

Matching in nixpkgs

pkgs.luksmeta

Simple library for storing metadata in the LUKSv1 header

  • nixos-unstable 9
    • nixpkgs-unstable 9
    • nixos-unstable-small 9

Package maintainers

Current stable never impacted.

https://github.com/NixOS/nixpkgs/commit/12b91943b41c223e7c6be3897ebb7ff543c9f38b