Home

Description

A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.

PUBLISHED Reserved 2025-10-09 | Published 2025-10-15 | Updated 2025-10-16 | Assigner redhat




MEDIUM: 4.4CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

Problem types

Improper Validation of Specified Quantity in Input

Product status

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-10-14:Reported to Red Hat.
2025-10-14:Made public.

References

access.redhat.com/security/cve/CVE-2025-11568 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2404244 (RHBZ#2404244) issue-tracking

cve.org (CVE-2025-11568)

nvd.nist.gov (CVE-2025-11568)

Download JSON