Bug 2404244 (CVE-2025-11568)

Summary: CVE-2025-11568 luksmeta: Data corruption when handling LUKS1 partitions with luksmeta
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A data corruption vulnerability has been identified in the luksmeta utility when used with the LUKS1 disk encryption format. An attacker with the necessary permissions can exploit this flaw by writing a large amount of metadata to an encrypted device. The utility fails to correctly validate the available space, causing the metadata to overwrite and corrupt the user's encrypted data. This action leads to a permanent loss of the stored information. Devices using the LUKS formats other than LUKS1 are not affected by this issue.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2404246, 2404247    
Bug Blocks:    

Description OSIDB Bzimport 2025-10-15 17:32:11 UTC
A vulnerability in the luksmeta utility may cause data corruption when storing large amounts of metadata. The flaw stems from the improper handling of the space between the LUKS1 header and the encrypted data payload. This can result in an overwrite of the encrypted data when writing user-controlled metadata into this area. This flaw affects only devices encrypted with LUKS1 version.