Calamares versions 3.1 through 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1835095 | Exploit Issue Tracking Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1835096 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1726542 | Issue Tracking Third Party Advisory |
https://calamares.io/calamares-3.2.11-is-out/ | Vendor Advisory |
https://calamares.io/calamares-cve-2019/ | Vendor Advisory |
https://github.com/calamares/calamares/issues/1191 | Exploit Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q57BOTBA2J5U4GVKUP7N2PD5H7B3BVUU/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2ZDQRGBGRVRW5LPJWKUNS3M66LZ3KYC/ |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-02T22:43:46
Updated: 2019-08-13T03:06:05
Reserved: 2019-07-02T00:00:00
Link: CVE-2019-13179
JSON object: View
NVD Information
Status : Modified
Published: 2019-07-02T23:15:09.907
Modified: 2023-11-07T03:03:47.770
Link: CVE-2019-13179
JSON object: View
Redhat Information
No data.
CWE