Description
Calamares versions 3.1 through 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption.
Published: 2019-07-02
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-4703 Calamares versions 3.1 through 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption.
History

No history.

Subscriptions

Calamares Calamares
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:41:10.573Z

Reserved: 2019-07-02T00:00:00.000Z

Link: CVE-2019-13179

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-02T23:15:09.907

Modified: 2024-11-21T04:24:22.110

Link: CVE-2019-13179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses