{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-43378","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-08-09T14:23:55.514Z","datePublished":"2024-08-15T23:53:07.103Z","dateUpdated":"2024-09-03T18:02:47.756Z"},"containers":{"cna":{"title":"calamares-nixos-extensions LUKS keyfile exposure regression on legacy BIOS systems","problemTypes":[{"descriptions":[{"cweId":"CWE-256","lang":"en","description":"CWE-256: Plaintext Storage of a Password","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/NixOS/calamares-nixos-extensions/security/advisories/GHSA-vfxf-gpmj-2p25","tags":["x_refsource_CONFIRM"],"url":"https://github.com/NixOS/calamares-nixos-extensions/security/advisories/GHSA-vfxf-gpmj-2p25"},{"name":"https://github.com/NixOS/calamares-nixos-extensions/security/advisories/GHSA-3rvf-24q2-24ww","tags":["x_refsource_MISC"],"url":"https://github.com/NixOS/calamares-nixos-extensions/security/advisories/GHSA-3rvf-24q2-24ww"},{"name":"https://github.com/NixOS/calamares-nixos-extensions/pull/43","tags":["x_refsource_MISC"],"url":"https://github.com/NixOS/calamares-nixos-extensions/pull/43"},{"name":"https://github.com/NixOS/nixpkgs/pull/331607","tags":["x_refsource_MISC"],"url":"https://github.com/NixOS/nixpkgs/pull/331607"},{"name":"https://github.com/NixOS/nixpkgs/pull/334252","tags":["x_refsource_MISC"],"url":"https://github.com/NixOS/nixpkgs/pull/334252"}],"affected":[{"vendor":"NixOS","product":"calamares-nixos-extensions","versions":[{"version":"< 0.3.17","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-08-15T23:53:07.103Z"},"descriptions":[{"lang":"en","value":"calamares-nixos-extensions provides Calamares branding and modules for NixOS, a distribution of GNU/Linux. Users who installed NixOS through the graphical installer who used manual disk partitioning to create a setup where the system was booted via legacy BIOS rather than UEFI; some disk partitions are encrypted; but the partitions containing either `/` or `/boot` are unencrypted; have their LUKS disk encryption key file in plain text either in `/crypto_keyfile.bin`, or in a CPIO archive attached to their NixOS initrd. `nixos-install` is not affected, nor are UEFI installations, nor was the default automatic partitioning configuration on legacy BIOS systems. The problem has been fixed in calamares-nixos-extensions 0.3.17, which was included in NixOS. The current installer images for the NixOS 24.05 and unstable (24.11) channels are unaffected. The fix reached 24.05 at 2024-08-13 20:06:59 UTC, and unstable at 2024-08-15 09:00:20 UTC. Installer images downloaded before those times may be vulnerable. The best solution for affected users is probably to back up their data and do a complete reinstallation. However, the mitigation procedure in GHSA-3rvf-24q2-24ww should work solely for the case where `/` is encrypted but `/boot` is not. If `/` is unencrypted, then the `/crypto_keyfile.bin` file will need to be deleted in addition to the remediation steps in the previous advisory. This issue is a partial regression of CVE-2023-36476 / GHSA-3rvf-24q2-24ww, which was more severe as it applied to the default configuration on BIOS systems."}],"source":{"advisory":"GHSA-vfxf-gpmj-2p25","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"nixos","product":"calamares-nixos-extensions","cpes":["cpe:2.3:a:nixos:calamares-nixos-extensions:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"0.3.17","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-19T20:54:33.909326Z","id":"CVE-2024-43378","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-03T18:02:47.756Z"}}]}}