Name | CVE-2019-13179 |
Description | Calamares versions 3.1 through 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 931373, 931392 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
calamares (PTS) | buster | 3.2.4-3 | vulnerable |
bullseye | 3.2.36-1 | fixed | |
bookworm | 3.2.61-1 | fixed | |
trixie | 3.3.9-1 | fixed | |
sid | 3.3.11-1 | fixed | |
calamares-settings-debian (PTS) | buster | 10.0.20-1+deb10u4 | fixed |
bullseye | 11.0.5-2 | fixed | |
bookworm | 12.0.9-1+deb12u2 | fixed | |
sid, trixie | 13.0.11-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
calamares | source | (unstable) | 3.2.11-1 | 931392 | ||
calamares-settings-debian | source | buster | 10.0.20-1+deb10u1 | |||
calamares-settings-debian | source | (unstable) | 10.0.23-1 | 931373 |
[buster] - calamares <ignored> (Mitigated via calamares-settings-debian in Debian)
https://github.com/calamares/calamares/issues/1191
https://github.com/calamares/calamares/commit/003096698627a527b589c0c929dda4d58f23fd93
The issue itself can be adressed as well via calamares-settings-debian and
placing a more restrictive umask override in /etc/initramfs-tools/conf.d
directory.
https://github.com/calamares/calamares/commit/43eb664e7d44d963bb7b82d03215d84b47100ba0
Fixed by: https://github.com/calamares/calamares/commit/c9b675cbc64ac5aab35ddd86a64311abd50f7720