Vulnerabilites related to ecryptfs - ecryptfs-utils
CVE-2011-1831 (GCVE-0-2011-1831)
Vulnerability from cvelistv5
Published
2014-02-15 11:00
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.762Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2011:0898",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://launchpad.net/ecryptfs/+download"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
          },
          {
            "name": "USN-1188-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1188-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-06T14:57:00",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "SUSE-SU-2011:0898",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://launchpad.net/ecryptfs/+download"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
        },
        {
          "name": "USN-1188-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1188-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2011-1831",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2011:0898",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
            },
            {
              "name": "https://launchpad.net/ecryptfs/+download",
              "refsource": "CONFIRM",
              "url": "https://launchpad.net/ecryptfs/+download"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=729465",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
            },
            {
              "name": "USN-1188-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1188-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2011-1831",
    "datePublished": "2014-02-15T11:00:00",
    "dateReserved": "2011-04-27T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.762Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1836 (GCVE-0-2011-1836)
Vulnerability from cvelistv5
Published
2014-02-15 11:00
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.838Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2011:0898",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://launchpad.net/ecryptfs/+download"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
          },
          {
            "name": "USN-1188-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1188-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-06T14:57:00",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "SUSE-SU-2011:0898",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://launchpad.net/ecryptfs/+download"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
        },
        {
          "name": "USN-1188-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1188-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2011-1836",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2011:0898",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
            },
            {
              "name": "https://launchpad.net/ecryptfs/+download",
              "refsource": "CONFIRM",
              "url": "https://launchpad.net/ecryptfs/+download"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=729465",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
            },
            {
              "name": "USN-1188-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1188-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2011-1836",
    "datePublished": "2014-02-15T11:00:00",
    "dateReserved": "2011-04-27T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-8946 (GCVE-0-2015-8946)
Vulnerability from cvelistv5
Published
2016-07-22 14:00
Modified
2024-08-06 08:36
Severity ?
CWE
  • n/a
Summary
ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:36:30.716Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20160714 Re: CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
          },
          {
            "name": "[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
          },
          {
            "name": "USN-3032-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-3032-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-08-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-07-22T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20160714 Re: CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
        },
        {
          "name": "[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
        },
        {
          "name": "USN-3032-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-3032-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-8946",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20160714 Re: CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
            },
            {
              "name": "[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
            },
            {
              "name": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857",
              "refsource": "CONFIRM",
              "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857"
            },
            {
              "name": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282",
              "refsource": "CONFIRM",
              "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
            },
            {
              "name": "USN-3032-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-3032-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-8946",
    "datePublished": "2016-07-22T14:00:00",
    "dateReserved": "2016-07-14T00:00:00",
    "dateUpdated": "2024-08-06T08:36:30.716Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-6224 (GCVE-0-2016-6224)
Vulnerability from cvelistv5
Published
2016-07-22 14:00
Modified
2024-08-06 01:22
Severity ?
CWE
  • n/a
Summary
ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:22:20.776Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20160714 Re: CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
          },
          {
            "name": "[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
          },
          {
            "name": "USN-3032-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-3032-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.launchpad.net/ecryptfs/+bug/1597154"
          },
          {
            "name": "FEDORA-2016-41301e2187",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5WWCVHDLRLZTYMXEIONYFHLYAXXLJW3/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-07-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20160714 Re: CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
        },
        {
          "name": "[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
        },
        {
          "name": "USN-3032-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-3032-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.launchpad.net/ecryptfs/+bug/1597154"
        },
        {
          "name": "FEDORA-2016-41301e2187",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5WWCVHDLRLZTYMXEIONYFHLYAXXLJW3/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-6224",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20160714 Re: CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
            },
            {
              "name": "[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
            },
            {
              "name": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282",
              "refsource": "CONFIRM",
              "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
            },
            {
              "name": "USN-3032-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-3032-1"
            },
            {
              "name": "https://bugs.launchpad.net/ecryptfs/+bug/1597154",
              "refsource": "CONFIRM",
              "url": "https://bugs.launchpad.net/ecryptfs/+bug/1597154"
            },
            {
              "name": "FEDORA-2016-41301e2187",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5WWCVHDLRLZTYMXEIONYFHLYAXXLJW3/"
            },
            {
              "name": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882",
              "refsource": "CONFIRM",
              "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-6224",
    "datePublished": "2016-07-22T14:00:00",
    "dateReserved": "2016-07-14T00:00:00",
    "dateUpdated": "2024-08-06T01:22:20.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1832 (GCVE-0-2011-1832)
Vulnerability from cvelistv5
Published
2014-02-15 11:00
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.811Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2011:0898",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://launchpad.net/ecryptfs/+download"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
          },
          {
            "name": "USN-1188-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1188-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-06T14:57:00",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "SUSE-SU-2011:0898",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://launchpad.net/ecryptfs/+download"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
        },
        {
          "name": "USN-1188-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1188-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2011-1832",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2011:0898",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
            },
            {
              "name": "https://launchpad.net/ecryptfs/+download",
              "refsource": "CONFIRM",
              "url": "https://launchpad.net/ecryptfs/+download"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=729465",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
            },
            {
              "name": "USN-1188-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1188-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2011-1832",
    "datePublished": "2014-02-15T11:00:00",
    "dateReserved": "2011-04-27T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.811Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1572 (GCVE-0-2016-1572)
Vulnerability from cvelistv5
Published
2016-01-22 15:00
Modified
2024-08-05 23:02
Severity ?
CWE
  • n/a
Summary
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:02:11.774Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:0239",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html"
          },
          {
            "name": "1034791",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034791"
          },
          {
            "name": "openSUSE-SU-2016:0291",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566"
          },
          {
            "name": "[oss-security] 20160120 Security issue in eCryptfs-utils (CVE-2016-1572)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6"
          },
          {
            "name": "openSUSE-SU-2016:0302",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html"
          },
          {
            "name": "USN-2876-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2876-1"
          },
          {
            "name": "FEDORA-2016-7b9a2fe987",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html"
          },
          {
            "name": "DSA-3450",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3450"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870"
          },
          {
            "name": "FEDORA-2016-b02ad4e424",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-05T14:57:01",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:0239",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html"
        },
        {
          "name": "1034791",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1034791"
        },
        {
          "name": "openSUSE-SU-2016:0291",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566"
        },
        {
          "name": "[oss-security] 20160120 Security issue in eCryptfs-utils (CVE-2016-1572)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6"
        },
        {
          "name": "openSUSE-SU-2016:0302",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html"
        },
        {
          "name": "USN-2876-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2876-1"
        },
        {
          "name": "FEDORA-2016-7b9a2fe987",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html"
        },
        {
          "name": "DSA-3450",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3450"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870"
        },
        {
          "name": "FEDORA-2016-b02ad4e424",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2016-1572",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:0239",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html"
            },
            {
              "name": "1034791",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1034791"
            },
            {
              "name": "openSUSE-SU-2016:0291",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
            },
            {
              "name": "https://bugs.launchpad.net/ecryptfs/+bug/1530566",
              "refsource": "CONFIRM",
              "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566"
            },
            {
              "name": "[oss-security] 20160120 Security issue in eCryptfs-utils (CVE-2016-1572)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6"
            },
            {
              "name": "openSUSE-SU-2016:0302",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html"
            },
            {
              "name": "USN-2876-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2876-1"
            },
            {
              "name": "FEDORA-2016-7b9a2fe987",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html"
            },
            {
              "name": "DSA-3450",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3450"
            },
            {
              "name": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870",
              "refsource": "CONFIRM",
              "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870"
            },
            {
              "name": "FEDORA-2016-b02ad4e424",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2016-1572",
    "datePublished": "2016-01-22T15:00:00",
    "dateReserved": "2016-01-12T00:00:00",
    "dateUpdated": "2024-08-05T23:02:11.774Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1834 (GCVE-0-2011-1834)
Vulnerability from cvelistv5
Published
2014-02-15 11:00
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:26.062Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2011:0898",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://launchpad.net/ecryptfs/+download"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
          },
          {
            "name": "USN-1188-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1188-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-06T14:57:00",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "SUSE-SU-2011:0898",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://launchpad.net/ecryptfs/+download"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
        },
        {
          "name": "USN-1188-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1188-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2011-1834",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2011:0898",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
            },
            {
              "name": "https://launchpad.net/ecryptfs/+download",
              "refsource": "CONFIRM",
              "url": "https://launchpad.net/ecryptfs/+download"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=729465",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
            },
            {
              "name": "USN-1188-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1188-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2011-1834",
    "datePublished": "2014-02-15T11:00:00",
    "dateReserved": "2011-04-27T00:00:00",
    "dateUpdated": "2024-08-06T22:37:26.062Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3409 (GCVE-0-2012-3409)
Vulnerability from cvelistv5
Published
2019-12-20 13:33
Modified
2024-08-06 20:05
Severity ?
CWE
  • suid helper does not restrict mounting filesystems with nosuid,nodev leading to possible privilege escalation
Summary
ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:05:12.386Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2012-3409"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3409"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/07/12/1"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/07/11/23"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/07/13/5"
          },
          {
            "name": "Red Hat",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/cve-2012-3409"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ecryptfs-utils",
          "vendor": "ecryptfs-utils",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 99"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "suid helper does not restrict mounting filesystems with nosuid,nodev leading to possible privilege escalation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-20T13:33:05",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security-tracker.debian.org/tracker/CVE-2012-3409"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3409"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/07/12/1"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/07/11/23"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/07/13/5"
        },
        {
          "name": "Red Hat",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/cve-2012-3409"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-3409",
    "datePublished": "2019-12-20T13:33:05",
    "dateReserved": "2012-06-14T00:00:00",
    "dateUpdated": "2024-08-06T20:05:12.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-9687 (GCVE-0-2014-9687)
Vulnerability from cvelistv5
Published
2015-03-16 14:00
Modified
2024-08-06 13:55
Severity ?
CWE
  • n/a
Summary
eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:55:04.224Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:0291",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
          },
          {
            "name": "[oss-security] 20150227 Re: eCryptfs key wrapping help to crack user password",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2015/02/28/3"
          },
          {
            "name": "[oss-security] 20150217 CVE request: Linux kernel ecryptfs 1-byte overwrite",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2015/02/17/7"
          },
          {
            "name": "[oss-security] 20150210 Re: eCryptfs key wrapping help to crack user password",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2015/02/10/16"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.launchpad.net/ecryptfs/+bug/906550"
          },
          {
            "name": "USN-2524-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2524-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-02T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:0291",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
        },
        {
          "name": "[oss-security] 20150227 Re: eCryptfs key wrapping help to crack user password",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2015/02/28/3"
        },
        {
          "name": "[oss-security] 20150217 CVE request: Linux kernel ecryptfs 1-byte overwrite",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2015/02/17/7"
        },
        {
          "name": "[oss-security] 20150210 Re: eCryptfs key wrapping help to crack user password",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2015/02/10/16"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.launchpad.net/ecryptfs/+bug/906550"
        },
        {
          "name": "USN-2524-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2524-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-9687",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:0291",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
            },
            {
              "name": "[oss-security] 20150227 Re: eCryptfs key wrapping help to crack user password",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2015/02/28/3"
            },
            {
              "name": "[oss-security] 20150217 CVE request: Linux kernel ecryptfs 1-byte overwrite",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2015/02/17/7"
            },
            {
              "name": "[oss-security] 20150210 Re: eCryptfs key wrapping help to crack user password",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2015/02/10/16"
            },
            {
              "name": "https://bugs.launchpad.net/ecryptfs/+bug/906550",
              "refsource": "MISC",
              "url": "https://bugs.launchpad.net/ecryptfs/+bug/906550"
            },
            {
              "name": "USN-2524-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2524-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-9687",
    "datePublished": "2015-03-16T14:00:00",
    "dateReserved": "2015-02-27T00:00:00",
    "dateUpdated": "2024-08-06T13:55:04.224Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1835 (GCVE-0-2011-1835)
Vulnerability from cvelistv5
Published
2014-02-15 11:00
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain time in the new-user creation steps.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.827Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2011:0898",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://launchpad.net/ecryptfs/+download"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
          },
          {
            "name": "USN-1188-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1188-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain time in the new-user creation steps."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-06T14:57:00",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "SUSE-SU-2011:0898",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://launchpad.net/ecryptfs/+download"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
        },
        {
          "name": "USN-1188-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1188-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2011-1835",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain time in the new-user creation steps."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2011:0898",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
            },
            {
              "name": "https://launchpad.net/ecryptfs/+download",
              "refsource": "CONFIRM",
              "url": "https://launchpad.net/ecryptfs/+download"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=729465",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
            },
            {
              "name": "USN-1188-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1188-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2011-1835",
    "datePublished": "2014-02-15T11:00:00",
    "dateReserved": "2011-04-27T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.827Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1837 (GCVE-0-2011-1837)
Vulnerability from cvelistv5
Published
2014-02-15 11:00
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.784Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2011:0898",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://launchpad.net/ecryptfs/+download"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
          },
          {
            "name": "USN-1188-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1188-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-06T14:57:00",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "SUSE-SU-2011:0898",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://launchpad.net/ecryptfs/+download"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
        },
        {
          "name": "USN-1188-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1188-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2011-1837",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2011:0898",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
            },
            {
              "name": "https://launchpad.net/ecryptfs/+download",
              "refsource": "CONFIRM",
              "url": "https://launchpad.net/ecryptfs/+download"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=729465",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
            },
            {
              "name": "USN-1188-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1188-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2011-1837",
    "datePublished": "2014-02-15T11:00:00",
    "dateReserved": "2011-04-27T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.784Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2015-03-16 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
Impacted products
Vendor Product Version
ecryptfs ecryptfs-utils *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2506416E-87CB-4702-AA3C-A432F1F3A25D",
              "versionEndIncluding": "104",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack."
    },
    {
      "lang": "es",
      "value": "eCryptfs 104 y anterioes utiliza por defecto salto para cifrar la contrase\u00f1a de montaje, esto hace que sea m\u00e1s f\u00e1cil para los atacantes obtener usuario y contrase\u00f1a a trav\u00e9s de ataques de fuerza bruta"
    }
  ],
  "id": "CVE-2014-9687",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-03-16T14:59:00.067",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/10/16"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/17/7"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/28/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2524-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.launchpad.net/ecryptfs/+bug/906550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/10/16"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/17/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/28/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2524-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.launchpad.net/ecryptfs/+bug/906550"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-07-22 14:59
Modified
2025-04-12 10:46
Summary
ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946.
Impacted products
Vendor Product Version
ecryptfs ecryptfs-utils *
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76E0F5E8-3299-416E-8931-D7F9F68CD4D0",
              "versionEndIncluding": "110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946."
    },
    {
      "lang": "es",
      "value": "ecryptfs-setup-swap en eCryptfs no impide la activaci\u00f3n de la partici\u00f3n de intercambio sin cifrar durante el inicio cuando se utiliza el particionamiento GPT en un controlador (1) NVMe o (2) MMC, lo que permite a usuarios locales obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2015-8946."
    }
  ],
  "id": "CVE-2016-6224",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-07-22T14:59:01.787",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-3032-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.launchpad.net/ecryptfs/+bug/1597154"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5WWCVHDLRLZTYMXEIONYFHLYAXXLJW3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-3032-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.launchpad.net/ecryptfs/+bug/1597154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5WWCVHDLRLZTYMXEIONYFHLYAXXLJW3/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-15 14:57
Modified
2025-04-11 00:51
Severity ?
Summary
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E226CD-F9E6-4B09-93B9-569D0FBDE943",
              "versionEndIncluding": "89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:62:*:*:*:*:*:*:*",
              "matchCriteriaId": "D197F4A3-473A-48FF-9C7F-658C6C1A6447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:63:*:*:*:*:*:*:*",
              "matchCriteriaId": "723E43D2-1130-424E-915E-1A6272FCEB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01C51EC-BE54-48B9-B9A5-740836C97B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:65:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFDA6DA-B6D7-4AAC-9288-A6AA459BE69B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:66:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC251173-56EF-47A9-A119-F9C274BAD2CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:67:*:*:*:*:*:*:*",
              "matchCriteriaId": "605ABD47-0352-49ED-A144-7C5696E38C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:68:*:*:*:*:*:*:*",
              "matchCriteriaId": "93457510-CCBF-4D63-B308-060BBAC06D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:69:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C9AC87-2A7B-45B5-BE9C-8244B777FAA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:70:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC81566-A73B-463B-86AE-D81B25C5849E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:71:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2BA072-A019-42FA-946D-53E01AC034AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:72:*:*:*:*:*:*:*",
              "matchCriteriaId": "77BDB4AC-112A-4CE9-88C7-4DEC352C7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:73:*:*:*:*:*:*:*",
              "matchCriteriaId": "574C934F-BDE7-4917-B24D-586DF6E148F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:74:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DB67B9-A924-4228-918F-322838B74E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:75:*:*:*:*:*:*:*",
              "matchCriteriaId": "6916E70E-C639-4880-83AC-5A90C589FFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:76:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF0B9852-4258-4963-98C4-7FED40BB0BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:77:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1862F4F-D023-4C9E-B2CD-F6DF282AB351",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:78:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A905D1F-F329-451E-92E1-E3AEA75000BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:79:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBD61AB-AE3C-4B21-A369-F38ED20489F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:80:*:*:*:*:*:*:*",
              "matchCriteriaId": "06DC6EF5-1192-4186-B99B-9615BF74F7B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:81:*:*:*:*:*:*:*",
              "matchCriteriaId": "F16E0B1E-C7FA-48D3-ACE1-5CCC4C8E3319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:82:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD6A8D7-2FEE-43B6-A6C2-C18A13A0E870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:83:*:*:*:*:*:*:*",
              "matchCriteriaId": "181A9F89-9B45-4025-BB7F-42B0AF6CB534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:84:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC38EDAA-BF0C-4BE3-9151-995A329B6653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:85:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE16EEF5-2EC2-4D35-8D0A-778E5F647600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:86:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7759293-210E-498E-BF9C-E11A748174CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:87:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A41D43F-E57C-41CB-A121-D1E3692900B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:58:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9A6D32-8A3D-4A25-BF1E-2ED812539F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:59:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9630D3-DE46-4C60-A9B0-57B8B9B3C857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:60:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFE4E253-4CE1-4122-8FFA-974A466D309B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:61:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A6D874-CFFC-49C8-8BB0-DC5DA52E5A16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call."
    },
    {
      "lang": "es",
      "value": "utils/mount.ecryptfs_private.c en ecryptfs-utils anterior a 90 no comprueba debidamente los permisos del punto de montaje, lo que permite a usuarios locales eliminar directorios a trav\u00e9s de una llamada al sistema umount."
    }
  ],
  "id": "CVE-2011-1832",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-15T14:57:06.283",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://launchpad.net/ecryptfs/+download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://launchpad.net/ecryptfs/+download"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-15 14:57
Modified
2025-04-11 00:51
Severity ?
Summary
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E226CD-F9E6-4B09-93B9-569D0FBDE943",
              "versionEndIncluding": "89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:62:*:*:*:*:*:*:*",
              "matchCriteriaId": "D197F4A3-473A-48FF-9C7F-658C6C1A6447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:63:*:*:*:*:*:*:*",
              "matchCriteriaId": "723E43D2-1130-424E-915E-1A6272FCEB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01C51EC-BE54-48B9-B9A5-740836C97B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:65:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFDA6DA-B6D7-4AAC-9288-A6AA459BE69B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:66:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC251173-56EF-47A9-A119-F9C274BAD2CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:67:*:*:*:*:*:*:*",
              "matchCriteriaId": "605ABD47-0352-49ED-A144-7C5696E38C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:68:*:*:*:*:*:*:*",
              "matchCriteriaId": "93457510-CCBF-4D63-B308-060BBAC06D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:69:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C9AC87-2A7B-45B5-BE9C-8244B777FAA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:70:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC81566-A73B-463B-86AE-D81B25C5849E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:71:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2BA072-A019-42FA-946D-53E01AC034AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:72:*:*:*:*:*:*:*",
              "matchCriteriaId": "77BDB4AC-112A-4CE9-88C7-4DEC352C7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:73:*:*:*:*:*:*:*",
              "matchCriteriaId": "574C934F-BDE7-4917-B24D-586DF6E148F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:74:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DB67B9-A924-4228-918F-322838B74E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:75:*:*:*:*:*:*:*",
              "matchCriteriaId": "6916E70E-C639-4880-83AC-5A90C589FFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:76:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF0B9852-4258-4963-98C4-7FED40BB0BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:77:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1862F4F-D023-4C9E-B2CD-F6DF282AB351",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:78:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A905D1F-F329-451E-92E1-E3AEA75000BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:79:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBD61AB-AE3C-4B21-A369-F38ED20489F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:80:*:*:*:*:*:*:*",
              "matchCriteriaId": "06DC6EF5-1192-4186-B99B-9615BF74F7B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:81:*:*:*:*:*:*:*",
              "matchCriteriaId": "F16E0B1E-C7FA-48D3-ACE1-5CCC4C8E3319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:82:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD6A8D7-2FEE-43B6-A6C2-C18A13A0E870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:83:*:*:*:*:*:*:*",
              "matchCriteriaId": "181A9F89-9B45-4025-BB7F-42B0AF6CB534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:84:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC38EDAA-BF0C-4BE3-9151-995A329B6653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:85:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE16EEF5-2EC2-4D35-8D0A-778E5F647600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:86:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7759293-210E-498E-BF9C-E11A748174CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:87:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A41D43F-E57C-41CB-A121-D1E3692900B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:58:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9A6D32-8A3D-4A25-BF1E-2ED812539F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:59:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9630D3-DE46-4C60-A9B0-57B8B9B3C857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:60:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFE4E253-4CE1-4122-8FFA-974A466D309B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:61:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A6D874-CFFC-49C8-8BB0-DC5DA52E5A16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call."
    },
    {
      "lang": "es",
      "value": "utils/mount.ecryptfs_private.c en ecryptfs-utils anterior a 90 no mantiene debidamente el archivo mtab durante condiciones de error, lo que permite a usuarios locales causar una denegaci\u00f3n de servicio (corrupci\u00f3n de tabla) o evadir restricciones de desmontaje a trav\u00e9s de una llamada al sistema umount."
    }
  ],
  "id": "CVE-2011-1834",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-15T14:57:06.300",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://launchpad.net/ecryptfs/+download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://launchpad.net/ecryptfs/+download"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-15 14:57
Modified
2025-04-11 00:51
Severity ?
Summary
utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E226CD-F9E6-4B09-93B9-569D0FBDE943",
              "versionEndIncluding": "89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:62:*:*:*:*:*:*:*",
              "matchCriteriaId": "D197F4A3-473A-48FF-9C7F-658C6C1A6447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:63:*:*:*:*:*:*:*",
              "matchCriteriaId": "723E43D2-1130-424E-915E-1A6272FCEB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01C51EC-BE54-48B9-B9A5-740836C97B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:65:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFDA6DA-B6D7-4AAC-9288-A6AA459BE69B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:66:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC251173-56EF-47A9-A119-F9C274BAD2CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:67:*:*:*:*:*:*:*",
              "matchCriteriaId": "605ABD47-0352-49ED-A144-7C5696E38C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:68:*:*:*:*:*:*:*",
              "matchCriteriaId": "93457510-CCBF-4D63-B308-060BBAC06D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:69:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C9AC87-2A7B-45B5-BE9C-8244B777FAA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:70:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC81566-A73B-463B-86AE-D81B25C5849E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:71:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2BA072-A019-42FA-946D-53E01AC034AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:72:*:*:*:*:*:*:*",
              "matchCriteriaId": "77BDB4AC-112A-4CE9-88C7-4DEC352C7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:73:*:*:*:*:*:*:*",
              "matchCriteriaId": "574C934F-BDE7-4917-B24D-586DF6E148F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:74:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DB67B9-A924-4228-918F-322838B74E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:75:*:*:*:*:*:*:*",
              "matchCriteriaId": "6916E70E-C639-4880-83AC-5A90C589FFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:76:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF0B9852-4258-4963-98C4-7FED40BB0BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:77:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1862F4F-D023-4C9E-B2CD-F6DF282AB351",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:78:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A905D1F-F329-451E-92E1-E3AEA75000BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:79:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBD61AB-AE3C-4B21-A369-F38ED20489F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:80:*:*:*:*:*:*:*",
              "matchCriteriaId": "06DC6EF5-1192-4186-B99B-9615BF74F7B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:81:*:*:*:*:*:*:*",
              "matchCriteriaId": "F16E0B1E-C7FA-48D3-ACE1-5CCC4C8E3319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:82:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD6A8D7-2FEE-43B6-A6C2-C18A13A0E870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:83:*:*:*:*:*:*:*",
              "matchCriteriaId": "181A9F89-9B45-4025-BB7F-42B0AF6CB534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:84:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC38EDAA-BF0C-4BE3-9151-995A329B6653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:85:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE16EEF5-2EC2-4D35-8D0A-778E5F647600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:86:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7759293-210E-498E-BF9C-E11A748174CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:87:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A41D43F-E57C-41CB-A121-D1E3692900B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:58:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9A6D32-8A3D-4A25-BF1E-2ED812539F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:59:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9630D3-DE46-4C60-A9B0-57B8B9B3C857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:60:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFE4E253-4CE1-4122-8FFA-974A466D309B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:61:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A6D874-CFFC-49C8-8BB0-DC5DA52E5A16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process."
    },
    {
      "lang": "es",
      "value": "utils/ecryptfs-recover-private en ecryptfs-utils anterior a 90 no establece un subdirectorio con permisos seguros, lo que podr\u00eda permitir a usuarios locales evadir las restricciones de acceso a trav\u00e9s de operaciones est\u00e1ndar del sistema de ficheros durante el proceso de recuperaci\u00f3n."
    }
  ],
  "id": "CVE-2011-1836",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-15T14:57:06.363",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://launchpad.net/ecryptfs/+download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://launchpad.net/ecryptfs/+download"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-15 14:57
Modified
2025-04-11 00:51
Severity ?
Summary
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E226CD-F9E6-4B09-93B9-569D0FBDE943",
              "versionEndIncluding": "89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:62:*:*:*:*:*:*:*",
              "matchCriteriaId": "D197F4A3-473A-48FF-9C7F-658C6C1A6447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:63:*:*:*:*:*:*:*",
              "matchCriteriaId": "723E43D2-1130-424E-915E-1A6272FCEB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01C51EC-BE54-48B9-B9A5-740836C97B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:65:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFDA6DA-B6D7-4AAC-9288-A6AA459BE69B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:66:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC251173-56EF-47A9-A119-F9C274BAD2CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:67:*:*:*:*:*:*:*",
              "matchCriteriaId": "605ABD47-0352-49ED-A144-7C5696E38C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:68:*:*:*:*:*:*:*",
              "matchCriteriaId": "93457510-CCBF-4D63-B308-060BBAC06D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:69:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C9AC87-2A7B-45B5-BE9C-8244B777FAA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:70:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC81566-A73B-463B-86AE-D81B25C5849E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:71:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2BA072-A019-42FA-946D-53E01AC034AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:72:*:*:*:*:*:*:*",
              "matchCriteriaId": "77BDB4AC-112A-4CE9-88C7-4DEC352C7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:73:*:*:*:*:*:*:*",
              "matchCriteriaId": "574C934F-BDE7-4917-B24D-586DF6E148F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:74:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DB67B9-A924-4228-918F-322838B74E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:75:*:*:*:*:*:*:*",
              "matchCriteriaId": "6916E70E-C639-4880-83AC-5A90C589FFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:76:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF0B9852-4258-4963-98C4-7FED40BB0BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:77:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1862F4F-D023-4C9E-B2CD-F6DF282AB351",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:78:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A905D1F-F329-451E-92E1-E3AEA75000BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:79:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBD61AB-AE3C-4B21-A369-F38ED20489F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:80:*:*:*:*:*:*:*",
              "matchCriteriaId": "06DC6EF5-1192-4186-B99B-9615BF74F7B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:81:*:*:*:*:*:*:*",
              "matchCriteriaId": "F16E0B1E-C7FA-48D3-ACE1-5CCC4C8E3319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:82:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD6A8D7-2FEE-43B6-A6C2-C18A13A0E870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:83:*:*:*:*:*:*:*",
              "matchCriteriaId": "181A9F89-9B45-4025-BB7F-42B0AF6CB534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:84:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC38EDAA-BF0C-4BE3-9151-995A329B6653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:85:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE16EEF5-2EC2-4D35-8D0A-778E5F647600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:86:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7759293-210E-498E-BF9C-E11A748174CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:87:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A41D43F-E57C-41CB-A121-D1E3692900B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:58:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9A6D32-8A3D-4A25-BF1E-2ED812539F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:59:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9630D3-DE46-4C60-A9B0-57B8B9B3C857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:60:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFE4E253-4CE1-4122-8FFA-974A466D309B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:61:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A6D874-CFFC-49C8-8BB0-DC5DA52E5A16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call."
    },
    {
      "lang": "es",
      "value": "utils/mount.ecryptfs_private.c en ecryptfs-utils anterior a 90 no comprueba debidamente los permisos del punto de montaje, lo que permite a usuarios locales reemplazar efectivamente cualquier directorio con un sistema de archivos nuevo, y en consecuencia ganar privilegios, a trav\u00e9s de una llamada al sistema mount."
    }
  ],
  "id": "CVE-2011-1831",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-15T14:57:06.253",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://launchpad.net/ecryptfs/+download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://launchpad.net/ecryptfs/+download"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-07-22 14:59
Modified
2025-04-12 10:46
Summary
ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors.
Impacted products
Vendor Product Version
canonical ubuntu_linux 15.10
canonical ubuntu_linux 16.04
ecryptfs ecryptfs-utils *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76E0F5E8-3299-416E-8931-D7F9F68CD4D0",
              "versionEndIncluding": "110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "ecryptfs-setup-swap en eCryptfs en versiones anteriores a 111 no impide la activaci\u00f3n de la partici\u00f3n de intercambio sin cifrar durante el inicio cuando se utiliza el particionamiento GPT y ciertas versiones de systemd, lo que permite a usuarios locales obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2015-8946",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-07-22T14:59:00.147",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-3032-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-3032-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-01-22 15:59
Modified
2025-04-12 10:46
Summary
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
References
security@ubuntu.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.htmlMailing List, Third Party Advisory
security@ubuntu.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.htmlMailing List, Third Party Advisory
security@ubuntu.comhttp://lists.opensuse.org/opensuse-updates/2016-01/msg00091.htmlMailing List, Third Party Advisory
security@ubuntu.comhttp://lists.opensuse.org/opensuse-updates/2016-01/msg00118.htmlMailing List, Third Party Advisory
security@ubuntu.comhttp://lists.opensuse.org/opensuse-updates/2016-02/msg00004.htmlMailing List, Third Party Advisory
security@ubuntu.comhttp://www.debian.org/security/2016/dsa-3450Patch, Third Party Advisory
security@ubuntu.comhttp://www.openwall.com/lists/oss-security/2016/01/20/6Mailing List, Third Party Advisory
security@ubuntu.comhttp://www.securitytracker.com/id/1034791Broken Link, Third Party Advisory, VDB Entry
security@ubuntu.comhttp://www.ubuntu.com/usn/USN-2876-1Patch, Third Party Advisory
security@ubuntu.comhttps://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870Patch, Third Party Advisory
security@ubuntu.comhttps://bugs.launchpad.net/ecryptfs/+bug/1530566Issue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3450Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/01/20/6Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034791Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2876-1Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugs.launchpad.net/ecryptfs/+bug/1530566Issue Tracking, Patch, Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A3AE66-605C-413F-81B6-37F176048498",
              "versionEndExcluding": "109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
              "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid."
    },
    {
      "lang": "es",
      "value": "mount.ecryptfs_private.c en eCryptfs-utils no valida el destino de montaje de los tipos de archivos de sistema, lo que permite a usuarios locales obtener privilegios mediante el montaje sobre un sistema de archivos no est\u00e1ndar, seg\u00fan lo demostrado por /proc/$pid."
    }
  ],
  "id": "CVE-2016-1572",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-01-22T15:59:07.833",
  "references": [
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3450"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1034791"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2876-1"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3450"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1034791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2876-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-15 14:57
Modified
2025-04-11 00:51
Severity ?
Summary
The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain time in the new-user creation steps.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E226CD-F9E6-4B09-93B9-569D0FBDE943",
              "versionEndIncluding": "89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:62:*:*:*:*:*:*:*",
              "matchCriteriaId": "D197F4A3-473A-48FF-9C7F-658C6C1A6447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:63:*:*:*:*:*:*:*",
              "matchCriteriaId": "723E43D2-1130-424E-915E-1A6272FCEB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01C51EC-BE54-48B9-B9A5-740836C97B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:65:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFDA6DA-B6D7-4AAC-9288-A6AA459BE69B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:66:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC251173-56EF-47A9-A119-F9C274BAD2CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:67:*:*:*:*:*:*:*",
              "matchCriteriaId": "605ABD47-0352-49ED-A144-7C5696E38C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:68:*:*:*:*:*:*:*",
              "matchCriteriaId": "93457510-CCBF-4D63-B308-060BBAC06D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:69:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C9AC87-2A7B-45B5-BE9C-8244B777FAA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:70:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC81566-A73B-463B-86AE-D81B25C5849E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:71:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2BA072-A019-42FA-946D-53E01AC034AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:72:*:*:*:*:*:*:*",
              "matchCriteriaId": "77BDB4AC-112A-4CE9-88C7-4DEC352C7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:73:*:*:*:*:*:*:*",
              "matchCriteriaId": "574C934F-BDE7-4917-B24D-586DF6E148F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:74:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DB67B9-A924-4228-918F-322838B74E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:75:*:*:*:*:*:*:*",
              "matchCriteriaId": "6916E70E-C639-4880-83AC-5A90C589FFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:76:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF0B9852-4258-4963-98C4-7FED40BB0BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:77:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1862F4F-D023-4C9E-B2CD-F6DF282AB351",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:78:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A905D1F-F329-451E-92E1-E3AEA75000BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:79:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBD61AB-AE3C-4B21-A369-F38ED20489F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:80:*:*:*:*:*:*:*",
              "matchCriteriaId": "06DC6EF5-1192-4186-B99B-9615BF74F7B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:81:*:*:*:*:*:*:*",
              "matchCriteriaId": "F16E0B1E-C7FA-48D3-ACE1-5CCC4C8E3319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:82:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD6A8D7-2FEE-43B6-A6C2-C18A13A0E870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:83:*:*:*:*:*:*:*",
              "matchCriteriaId": "181A9F89-9B45-4025-BB7F-42B0AF6CB534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:84:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC38EDAA-BF0C-4BE3-9151-995A329B6653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:85:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE16EEF5-2EC2-4D35-8D0A-778E5F647600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:86:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7759293-210E-498E-BF9C-E11A748174CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:87:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A41D43F-E57C-41CB-A121-D1E3692900B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:58:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9A6D32-8A3D-4A25-BF1E-2ED812539F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:59:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9630D3-DE46-4C60-A9B0-57B8B9B3C857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:60:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFE4E253-4CE1-4122-8FFA-974A466D309B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:61:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A6D874-CFFC-49C8-8BB0-DC5DA52E5A16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain time in the new-user creation steps."
    },
    {
      "lang": "es",
      "value": "El proceso de configuraci\u00f3n de directorio privado cifrado en utils/ecryptfs-setup-private en ecryptfs-utils anterior a 90 no asegura debidamente que el archivo passphrase es creado, lo que podr\u00eda permitir a usuarios locales evadir las restricciones de acceso en cierto momento en los pasos de creaci\u00f3n de un nuevo usuario."
    }
  ],
  "id": "CVE-2011-1835",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-15T14:57:06.330",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://launchpad.net/ecryptfs/+download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://launchpad.net/ecryptfs/+download"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-20 14:15
Modified
2024-11-21 01:40
Summary
ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation
Impacted products
Vendor Product Version
ecryptfs ecryptfs-utils *
debian debian_linux 8.0
debian debian_linux 9.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C34C2E9E-1220-4971-9DC1-9C4F0397BC71",
              "versionEndExcluding": "99",
              "versionStartIncluding": "86",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation"
    },
    {
      "lang": "es",
      "value": "ecryptfs-utils: el asistente suid no restringe el montaje de sistemas de archivos con nosuid,nodev lo que genera una posible escalada de privilegios"
    }
  ],
  "id": "CVE-2012-3409",
  "lastModified": "2024-11-21T01:40:48.770",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-20T14:15:11.260",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/07/11/23"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/07/12/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/07/13/5"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2012-3409"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3409"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2012-3409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/07/11/23"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/07/12/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/07/13/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2012-3409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2012-3409"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-15 14:57
Modified
2025-04-11 00:51
Severity ?
Summary
The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E226CD-F9E6-4B09-93B9-569D0FBDE943",
              "versionEndIncluding": "89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:62:*:*:*:*:*:*:*",
              "matchCriteriaId": "D197F4A3-473A-48FF-9C7F-658C6C1A6447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:63:*:*:*:*:*:*:*",
              "matchCriteriaId": "723E43D2-1130-424E-915E-1A6272FCEB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01C51EC-BE54-48B9-B9A5-740836C97B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:65:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFDA6DA-B6D7-4AAC-9288-A6AA459BE69B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:66:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC251173-56EF-47A9-A119-F9C274BAD2CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:67:*:*:*:*:*:*:*",
              "matchCriteriaId": "605ABD47-0352-49ED-A144-7C5696E38C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:68:*:*:*:*:*:*:*",
              "matchCriteriaId": "93457510-CCBF-4D63-B308-060BBAC06D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:69:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C9AC87-2A7B-45B5-BE9C-8244B777FAA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:70:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC81566-A73B-463B-86AE-D81B25C5849E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:71:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2BA072-A019-42FA-946D-53E01AC034AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:72:*:*:*:*:*:*:*",
              "matchCriteriaId": "77BDB4AC-112A-4CE9-88C7-4DEC352C7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:73:*:*:*:*:*:*:*",
              "matchCriteriaId": "574C934F-BDE7-4917-B24D-586DF6E148F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:74:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DB67B9-A924-4228-918F-322838B74E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:75:*:*:*:*:*:*:*",
              "matchCriteriaId": "6916E70E-C639-4880-83AC-5A90C589FFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:76:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF0B9852-4258-4963-98C4-7FED40BB0BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:77:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1862F4F-D023-4C9E-B2CD-F6DF282AB351",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:78:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A905D1F-F329-451E-92E1-E3AEA75000BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:79:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBD61AB-AE3C-4B21-A369-F38ED20489F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:80:*:*:*:*:*:*:*",
              "matchCriteriaId": "06DC6EF5-1192-4186-B99B-9615BF74F7B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:81:*:*:*:*:*:*:*",
              "matchCriteriaId": "F16E0B1E-C7FA-48D3-ACE1-5CCC4C8E3319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:82:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD6A8D7-2FEE-43B6-A6C2-C18A13A0E870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:83:*:*:*:*:*:*:*",
              "matchCriteriaId": "181A9F89-9B45-4025-BB7F-42B0AF6CB534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:84:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC38EDAA-BF0C-4BE3-9151-995A329B6653",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:85:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE16EEF5-2EC2-4D35-8D0A-778E5F647600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:86:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7759293-210E-498E-BF9C-E11A748174CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:87:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A41D43F-E57C-41CB-A121-D1E3692900B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:58:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9A6D32-8A3D-4A25-BF1E-2ED812539F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:59:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9630D3-DE46-4C60-A9B0-57B8B9B3C857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:60:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFE4E253-4CE1-4122-8FFA-974A466D309B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ecryptfs:ecryptfs_utils:61:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A6D874-CFFC-49C8-8BB0-DC5DA52E5A16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n lock-counter en utils/mount.ecryptfs_private.c en ecryptfs-utils anterior a 90 permite a usuarios locales sobreescribir archivos arbitrarios a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2011-1837",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-15T14:57:06.377",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://launchpad.net/ecryptfs/+download"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1188-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://launchpad.net/ecryptfs/+download"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}