Calamares versions 3.1 through 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-4703 Calamares versions 3.1 through 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:41:10.573Z

Reserved: 2019-07-02T00:00:00

Link: CVE-2019-13179

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-02T23:15:09.907

Modified: 2024-11-21T04:24:22.110

Link: CVE-2019-13179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.