DescriptionCalamares versions 3.1 through 3.2.10 copies a LUKS encryption keyfile from /crypto_keyfile.bin (mode 0600 owned by root) to /boot within a globally readable initramfs image with insecure permissions, which allows this originally protected file to be read by any user, thereby disclosing decryption keys for LUKS containers created with Full Disk Encryption.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs931373, 931392

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
calamares (PTS)buster3.2.4-3vulnerable
bullseye, sid3.2.17.1-1fixed
calamares-settings-debian (PTS)buster10.0.20-1+deb10u1fixed
bullseye, sid11.0.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[buster] - calamares <ignored> (Mitigated via calamares-settings-debian in Debian)
The issue itself can be adressed as well via calamares-settings-debian and
placing a more restrictive umask override in /etc/initramfs-tools/conf.d
Fixed by:

Search for package or bug name: Reporting problems