5
CVSSv2

CVE-2019-13179

Published: 02/07/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Calamares versions 3.1 up to and including 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

calamares calamares

Vendor Advisories

Debian Bug report logs - #931373 calamares-settings-debian: default permissions on initramfs is insecure for full-disk encryption Package: calamares-settings-debian; Maintainer for calamares-settings-debian is Jonathan Carter <jcc@debianorg>; Source for calamares-settings-debian is src:calamares-settings-debian (PTS, buildd, popcon ...