Calamares versions 3.1 through 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption.
References
Link | Resource |
---|---|
https://github.com/calamares/calamares/issues/1191 | Exploit Issue Tracking Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1835096 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1835095 | Exploit Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1726542 | Issue Tracking Third Party Advisory |
https://calamares.io/calamares-cve-2019/ | Vendor Advisory |
https://calamares.io/calamares-3.2.11-is-out/ | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q57BOTBA2J5U4GVKUP7N2PD5H7B3BVUU/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2ZDQRGBGRVRW5LPJWKUNS3M66LZ3KYC/ |
Configurations
Information
Published : 2019-07-02 16:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-13179
Mitre link : CVE-2019-13179
JSON object : View
CWE
CWE-522
Insufficiently Protected Credentials
Products Affected
calamares
- calamares