Access to keyboard on booting system is not physical access. System may have protected GRUB and firmware. Attacker may got priveleged shell without physical access and damage data, firmware, or add keyloger into /boot.
** Description changed: You should have root filesystem encrypted by LUKS. Start operational system and enter incorrect passphrase for root filesystem three times. Wait several seconds and you give busybox shell with superuser rights from initramdisk. - System should not open shell. It should ask for passphrase forever or show error, but don't open shell. + System should not open shell. It should ask for passphrase forever or show error, but don't open shell. OS: Ubuntu 12.04, Ubuntu 14.04. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu. https://bugs.launchpad.net/bugs/1374742 Title: opening privileged shell after entering wrong password for LUKS three times Status in tools for generating an initramfs: New Status in “initramfs-tools” package in Ubuntu: Invalid Bug description: You should have root filesystem encrypted by LUKS. Start operational system and enter incorrect passphrase for root filesystem three times. Wait several seconds and you give busybox shell with superuser rights from initramdisk. System should not open shell. It should ask for passphrase forever or show error, but don't open shell. OS: Ubuntu 12.04, Ubuntu 14.04. To manage notifications about this bug go to: https://bugs.launchpad.net/initramfs-tools/+bug/1374742/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp