Bug 28078 - veracrypt new security issue CVE-2019-1010208
Summary: veracrypt new security issue CVE-2019-1010208
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: https://nvd.nist.gov/vuln/detail/CVE-...
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-01-13 11:19 CET by Zombie Ryushu
Modified: 2021-02-19 11:29 CET (History)
6 users (show)

See Also:
Source RPM: veracrypt-1.23-1.mga7.src
CVE: CVE-2019-1010208
Status comment:


Attachments

Description Zombie Ryushu 2021-01-13 11:19:22 CET
IDRIX, Truecrypt Veracrypt, Truecrypt Prior to 1.23-Hotfix-1 (Veracrypt), all versions (Truecrypt) is affected by: Buffer Overflow. The impact is: Minor information disclosure of kernel stack. The component is: Veracrypt NT Driver (veracrypt.sys). The attack vector is: Locally executed code, IOCTL request to driver. The fixed version is: 1.23-Hotfix-1.
Zombie Ryushu 2021-01-13 11:19:38 CET

CVE: (none) => CVE-2019-1010208

Comment 1 Aurelien Oudelet 2021-01-13 15:28:09 CET
Hi, thanks for reporting this.
Assigned to the package maintainer, I added the committers in CC.

(Please set the status to 'assigned' if you are working on it)

CC: (none) => geiger.david68210, jani.valimaa, ouaurelien
Assignee: bugsquad => mageia

Comment 2 David Walser 2021-01-13 17:42:15 CET
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010208

Assignee: mageia => geiger.david68210
Status comment: (none) => Patch available from upstream
CC: (none) => mageia
Summary: veracrypt security vulnerability CVE-2019-1010208 => veracrypt new security issue CVE-2019-1010208

Comment 3 David GEIGER 2021-01-24 13:15:38 CET
Done for mga7!
Comment 4 David Walser 2021-01-24 16:24:36 CET
Advisory:
========================

Updated veracrypt package fixes security vulnerability:

IDRIX, Truecrypt Veracrypt, Truecrypt Prior to 1.23-Hotfix-1 (Veracrypt), all
versions (Truecrypt) is affected by: Buffer Overflow. The impact is: Minor
information disclosure of kernel stack. The component is: Veracrypt NT Driver
(veracrypt.sys). The attack vector is: Locally executed code, IOCTL request to
driver (CVE-2019-1010208).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010208
========================

Updated packages in core/updates_testing:
========================
veracrypt-1.23-1.2.mga7

from veracrypt-1.23-1.2.mga7.src.rpm

Status comment: Patch available from upstream => (none)
Assignee: geiger.david68210 => qa-bugs

Comment 5 Brian Rockwell 2021-02-04 02:45:52 CET
$ uname -a
Linux linux.local 5.10.12-desktop-1.mga7 #1 SMP Sat Jan 30 14:29:33 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux



The following 2 packages are going to be installed:

- sudo-1.9.5p2-1.mga7.x86_64
- veracrypt-1.23-1.2.mga7.x86_64


I had to set up my ID with sudo for this to work.  There is a good page in Mageia for that.

Set up a 100 MB volume and was able to open and add items.

Working as designed.

CC: (none) => brtians1
Whiteboard: (none) => MGA7-64-OK

Comment 6 Aurelien Oudelet 2021-02-04 09:13:29 CET
Yes, but after reread this:
> The component is: Veracrypt NT Driver (veracrypt.sys). The attack vector is:
> Locally executed code, IOCTL request... (...)

Is this a windows-only sec bug? The github page refers to a Windows bug too.

So meanwhile, advisory commited. Validating update.

CC: (none) => sysadmin-bugs
Keywords: (none) => advisory, validated_update

Comment 7 Thomas Backlund 2021-02-04 09:23:21 CET
yeah, why should we push a linux update for a windows bug ??

Keywords: validated_update => (none)

Aurelien Oudelet 2021-02-04 09:44:27 CET

Whiteboard: MGA7-64-OK => (none)
Keywords: advisory => feedback

Comment 9 Brian Rockwell 2021-02-04 14:13:00 CET
I wondered that as well, but it tested out fine and keeps us current.  

You never know they may have slipped in another change that benefits the security of the Linux version as well.

If not too much effort, I would recommend sending the update to the 4 users who use it.
Comment 10 Aurelien Oudelet 2021-02-19 10:35:58 CET
(In reply to Brian Rockwell from comment #9)
> I wondered that as well, but it tested out fine and keeps us current.  
> 
> You never know they may have slipped in another change that benefits the
> security of the Linux version as well.
> 
> If not too much effort, I would recommend sending the update to the 4 users
> who use it.

Flushing this out.

Whiteboard: (none) => MGA7-64-OK
Keywords: feedback => advisory, validated_update

Comment 11 Mageia Robot 2021-02-19 11:29:07 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0088.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.