SB2019070308 - Multiple vulnerabilities in Calamares
Published: July 3, 2019 Updated: December 5, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Incorrect default permissions (CVE-ID: CVE-2019-13179)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to incorrect default permissions for files that are copied from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image. A local user can decryption keys for LUKS containers created with Full Disk Encryption.
2) Race condition (CVE-ID: CVE-2019-13178)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in modules/luksbootkeyfile/main.py when creating LUKS encryption keyfile. A local user can exploit the race and gain unauthorized access to sensitive information in the encryption file while the application sets permissions on the file.
Remediation
Install update from vendor's website.
References
- https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1835095
- https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1835096
- https://bugzilla.redhat.com/show_bug.cgi?id=1726542
- https://calamares.io/calamares-3.2.11-is-out/
- https://calamares.io/calamares-cve-2019/
- https://github.com/calamares/calamares/issues/1191
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q57BOTBA2J5U4GVKUP7N2PD5H7B3BVUU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2ZDQRGBGRVRW5LPJWKUNS3M66LZ3KYC/
- https://bugzilla.redhat.com/show_bug.cgi?id=1726565
- https://github.com/calamares/calamares/issues/1190
- https://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/
- https://www.pavelkogan.com/2015/01/25/linux-mint-encryption/