Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-1572 (GCVE-0-2016-1572)
Vulnerability from cvelistv5
Published
2016-01-22 15:00
Modified
2024-08-05 23:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:11.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2016:0239", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" }, { "name": "1034791", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034791" }, { "name": "openSUSE-SU-2016:0291", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566" }, { "name": "[oss-security] 20160120 Security issue in eCryptfs-utils (CVE-2016-1572)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6" }, { "name": "openSUSE-SU-2016:0302", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" }, { "name": "USN-2876-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2876-1" }, { "name": "FEDORA-2016-7b9a2fe987", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html" }, { "name": "DSA-3450", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3450" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870" }, { "name": "FEDORA-2016-b02ad4e424", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T14:57:01", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "name": "openSUSE-SU-2016:0239", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" }, { "name": "1034791", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034791" }, { "name": "openSUSE-SU-2016:0291", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566" }, { "name": "[oss-security] 20160120 Security issue in eCryptfs-utils (CVE-2016-1572)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6" }, { "name": "openSUSE-SU-2016:0302", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" }, { "name": "USN-2876-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2876-1" }, { "name": "FEDORA-2016-7b9a2fe987", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html" }, { "name": "DSA-3450", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3450" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870" }, { "name": "FEDORA-2016-b02ad4e424", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2016-1572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:0239", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" }, { "name": "1034791", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034791" }, { "name": "openSUSE-SU-2016:0291", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" }, { "name": "https://bugs.launchpad.net/ecryptfs/+bug/1530566", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566" }, { "name": "[oss-security] 20160120 Security issue in eCryptfs-utils (CVE-2016-1572)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6" }, { "name": "openSUSE-SU-2016:0302", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" }, { "name": "USN-2876-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2876-1" }, { "name": "FEDORA-2016-7b9a2fe987", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html" }, { "name": "DSA-3450", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3450" }, { "name": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870", "refsource": "CONFIRM", "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870" }, { "name": "FEDORA-2016-b02ad4e424", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2016-1572", "datePublished": "2016-01-22T15:00:00", "dateReserved": "2016-01-12T00:00:00", "dateUpdated": "2024-08-05T23:02:11.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-1572\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2016-01-22T15:59:07.833\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.\"},{\"lang\":\"es\",\"value\":\"mount.ecryptfs_private.c en eCryptfs-utils no valida el destino de montaje de los tipos de archivos de sistema, lo que permite a usuarios locales obtener privilegios mediante el montaje sobre un sistema de archivos no est\u00e1ndar, seg\u00fan lo demostrado por /proc/$pid.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"109\",\"matchCriteriaId\":\"19A3AE66-605C-413F-81B6-37F176048498\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38D3B7E-8429-473F-BB31-FC3583EE5A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4863BE36-D16A-4D75-90D9-FD76DB5B48B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253C303A-E577-4488-93E6-68A8DD942C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79AB8DD-C907-4038-A931-1A5A4CFB6A5B\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3450\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/20/6\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1034791\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2876-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugs.launchpad.net/ecryptfs/+bug/1530566\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3450\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/20/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1034791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2876-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugs.launchpad.net/ecryptfs/+bug/1530566\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
ghsa-v495-vr49-324q
Vulnerability from github
Published
2022-05-13 01:03
Modified
2022-05-13 01:03
Severity ?
VLAI Severity ?
Details
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
{ "affected": [], "aliases": [ "CVE-2016-1572" ], "database_specific": { "cwe_ids": [ "CWE-269" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-01-22T15:59:00Z", "severity": "HIGH" }, "details": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.", "id": "GHSA-v495-vr49-324q", "modified": "2022-05-13T01:03:06Z", "published": "2022-05-13T01:03:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1572" }, { "type": "WEB", "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870" }, { "type": "WEB", "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3450" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1034791" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2876-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2016-1572
Vulnerability from fkie_nvd
Published
2016-01-22 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
References
▶ | URL | Tags | |
---|---|---|---|
security@ubuntu.com | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://www.debian.org/security/2016/dsa-3450 | Patch, Third Party Advisory | |
security@ubuntu.com | http://www.openwall.com/lists/oss-security/2016/01/20/6 | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://www.securitytracker.com/id/1034791 | Broken Link, Third Party Advisory, VDB Entry | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-2876-1 | Patch, Third Party Advisory | |
security@ubuntu.com | https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870 | Patch, Third Party Advisory | |
security@ubuntu.com | https://bugs.launchpad.net/ecryptfs/+bug/1530566 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3450 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/01/20/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034791 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2876-1 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.launchpad.net/ecryptfs/+bug/1530566 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ecryptfs | ecryptfs-utils | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.04 | |
canonical | ubuntu_linux | 15.10 | |
opensuse | leap | 42.1 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
fedoraproject | fedora | 22 | |
fedoraproject | fedora | 23 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*", "matchCriteriaId": "19A3AE66-605C-413F-81B6-37F176048498", "versionEndExcluding": "109", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid." }, { "lang": "es", "value": "mount.ecryptfs_private.c en eCryptfs-utils no valida el destino de montaje de los tipos de archivos de sistema, lo que permite a usuarios locales obtener privilegios mediante el montaje sobre un sistema de archivos no est\u00e1ndar, seg\u00fan lo demostrado por /proc/$pid." } ], "id": "CVE-2016-1572", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-22T15:59:07.833", "references": [ { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" }, { "source": "security@ubuntu.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3450" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6" }, { "source": "security@ubuntu.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034791" }, { "source": "security@ubuntu.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2876-1" }, { "source": "security@ubuntu.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870" }, { "source": "security@ubuntu.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2876-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2016-1572
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-1572", "description": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.", "id": "GSD-2016-1572", "references": [ "https://www.suse.com/security/cve/CVE-2016-1572.html", "https://www.debian.org/security/2016/dsa-3450", "https://ubuntu.com/security/CVE-2016-1572" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-1572" ], "details": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.", "id": "GSD-2016-1572", "modified": "2023-12-13T01:21:24.095285Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2016-1572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:0239", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" }, { "name": "1034791", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034791" }, { "name": "openSUSE-SU-2016:0291", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" }, { "name": "https://bugs.launchpad.net/ecryptfs/+bug/1530566", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566" }, { "name": "[oss-security] 20160120 Security issue in eCryptfs-utils (CVE-2016-1572)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6" }, { "name": "openSUSE-SU-2016:0302", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" }, { "name": "USN-2876-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2876-1" }, { "name": "FEDORA-2016-7b9a2fe987", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html" }, { "name": "DSA-3450", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3450" }, { "name": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870", "refsource": "CONFIRM", "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870" }, { "name": "FEDORA-2016-b02ad4e424", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "109", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2016-1572" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-269" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160120 Security issue in eCryptfs-utils (CVE-2016-1572)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/6" }, { "name": "USN-2876-1", "refsource": "UBUNTU", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2876-1" }, { "name": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870" }, { "name": "https://bugs.launchpad.net/ecryptfs/+bug/1530566", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ecryptfs/+bug/1530566" }, { "name": "DSA-3450", "refsource": "DEBIAN", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3450" }, { "name": "openSUSE-SU-2016:0239", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" }, { "name": "openSUSE-SU-2016:0291", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" }, { "name": "openSUSE-SU-2016:0302", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" }, { "name": "FEDORA-2016-b02ad4e424", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html" }, { "name": "FEDORA-2016-7b9a2fe987", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html" }, { "name": "1034791", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034791" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9 } }, "lastModifiedDate": "2022-03-23T17:19Z", "publishedDate": "2016-01-22T15:59Z" } } }
suse-su-2016:0290-1
Vulnerability from csaf_suse
Published
2016-01-30 19:29
Modified
2016-01-30 19:29
Summary
Security update for ecryptfs-utils
Notes
Title of the patch
Security update for ecryptfs-utils
Description of the patch
This update for ecryptfs-utils fixes the following issues:
- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
Patchnames
sledsp3-ecryptfs-utils-12379,sledsp4-ecryptfs-utils-12379,slessp3-ecryptfs-utils-12379,slessp4-ecryptfs-utils-12379
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ecryptfs-utils", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for ecryptfs-utils fixes the following issues:\n\n- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)\n- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-ecryptfs-utils-12379,sledsp4-ecryptfs-utils-12379,slessp3-ecryptfs-utils-12379,slessp4-ecryptfs-utils-12379", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0290-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0290-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160290-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0290-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" }, { "category": "self", "summary": "SUSE Bug 920160", "url": "https://bugzilla.suse.com/920160" }, { "category": "self", "summary": "SUSE Bug 962052", "url": "https://bugzilla.suse.com/962052" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9687 page", "url": "https://www.suse.com/security/cve/CVE-2014-9687/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1572 page", "url": "https://www.suse.com/security/cve/CVE-2016-1572/" } ], "title": "Security update for ecryptfs-utils", "tracking": { "current_release_date": "2016-01-30T19:29:33Z", "generator": { "date": "2016-01-30T19:29:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0290-1", "initial_release_date": "2016-01-30T19:29:33Z", "revision_history": [ { "date": "2016-01-30T19:29:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-61-1.35.1.i586", "product": { "name": "ecryptfs-utils-61-1.35.1.i586", "product_id": "ecryptfs-utils-61-1.35.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-61-1.35.1.ia64", "product": { "name": "ecryptfs-utils-61-1.35.1.ia64", "product_id": "ecryptfs-utils-61-1.35.1.ia64" } }, { "category": "product_version", "name": "ecryptfs-utils-x86-61-1.35.1.ia64", "product": { "name": "ecryptfs-utils-x86-61-1.35.1.ia64", "product_id": "ecryptfs-utils-x86-61-1.35.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-61-1.35.1.ppc64", "product": { "name": "ecryptfs-utils-61-1.35.1.ppc64", "product_id": "ecryptfs-utils-61-1.35.1.ppc64" } }, { "category": "product_version", "name": "ecryptfs-utils-32bit-61-1.35.1.ppc64", "product": { "name": "ecryptfs-utils-32bit-61-1.35.1.ppc64", "product_id": "ecryptfs-utils-32bit-61-1.35.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-61-1.35.1.s390x", "product": { "name": "ecryptfs-utils-61-1.35.1.s390x", "product_id": "ecryptfs-utils-61-1.35.1.s390x" } }, { "category": "product_version", "name": "ecryptfs-utils-32bit-61-1.35.1.s390x", "product": { "name": "ecryptfs-utils-32bit-61-1.35.1.s390x", "product_id": "ecryptfs-utils-32bit-61-1.35.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-61-1.35.1.x86_64", "product": { "name": "ecryptfs-utils-61-1.35.1.x86_64", "product_id": "ecryptfs-utils-61-1.35.1.x86_64" } }, { "category": "product_version", "name": "ecryptfs-utils-32bit-61-1.35.1.x86_64", "product": { "name": "ecryptfs-utils-32bit-61-1.35.1.x86_64", "product_id": "ecryptfs-utils-32bit-61-1.35.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.i586" }, "product_reference": "ecryptfs-utils-61-1.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.i586" }, "product_reference": "ecryptfs-utils-61-1.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP4", "product_id": "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.i586" }, "product_reference": "ecryptfs-utils-61-1.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-x86-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-x86-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.i586" }, "product_reference": "ecryptfs-utils-61-1.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-x86-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-x86-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-x86-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.i586" }, "product_reference": "ecryptfs-utils-61-1.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-x86-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-x86-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.i586" }, "product_reference": "ecryptfs-utils-61-1.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-x86-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-x86-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.i586" }, "product_reference": "ecryptfs-utils-61-1.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-61-1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-61-1.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-x86-61-1.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64" }, "product_reference": "ecryptfs-utils-x86-61-1.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9687" } ], "notes": [ { "category": "general", "text": "eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9687", "url": "https://www.suse.com/security/cve/CVE-2014-9687" }, { "category": "external", "summary": "SUSE Bug 920160 for CVE-2014-9687", "url": "https://bugzilla.suse.com/920160" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64" ] } ], "threats": [ { "category": "impact", "date": "2016-01-30T19:29:33Z", "details": "moderate" } ], "title": "CVE-2014-9687" }, { "cve": "CVE-2016-1572", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1572" } ], "notes": [ { "category": "general", "text": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1572", "url": "https://www.suse.com/security/cve/CVE-2016-1572" }, { "category": "external", "summary": "SUSE Bug 962052 for CVE-2016-1572", "url": "https://bugzilla.suse.com/962052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Desktop 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:ecryptfs-utils-x86-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-32bit-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-61-1.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ecryptfs-utils-x86-61-1.35.1.ia64" ] } ], "threats": [ { "category": "impact", "date": "2016-01-30T19:29:33Z", "details": "moderate" } ], "title": "CVE-2016-1572" } ] }
suse-su-2016:0241-1
Vulnerability from csaf_suse
Published
2016-01-25 16:34
Modified
2016-01-25 16:34
Summary
Security update for ecryptfs-utils
Notes
Title of the patch
Security update for ecryptfs-utils
Description of the patch
This update for ecryptfs-utils fixes the following issues:
- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
Patchnames
SUSE-SLE-DESKTOP-12-2016-153,SUSE-SLE-DESKTOP-12-SP1-2016-153,SUSE-SLE-SERVER-12-2016-153,SUSE-SLE-SERVER-12-SP1-2016-153
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ecryptfs-utils", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for ecryptfs-utils fixes the following issues:\n\n- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)\n- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2016-153,SUSE-SLE-DESKTOP-12-SP1-2016-153,SUSE-SLE-SERVER-12-2016-153,SUSE-SLE-SERVER-12-SP1-2016-153", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0241-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0241-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160241-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0241-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-January/001827.html" }, { "category": "self", "summary": "SUSE Bug 920160", "url": "https://bugzilla.suse.com/920160" }, { "category": "self", "summary": "SUSE Bug 962052", "url": "https://bugzilla.suse.com/962052" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9687 page", "url": "https://www.suse.com/security/cve/CVE-2014-9687/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1572 page", "url": "https://www.suse.com/security/cve/CVE-2016-1572/" } ], "title": "Security update for ecryptfs-utils", "tracking": { "current_release_date": "2016-01-25T16:34:16Z", "generator": { "date": "2016-01-25T16:34:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0241-1", "initial_release_date": "2016-01-25T16:34:16Z", "revision_history": [ { "date": "2016-01-25T16:34:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-103-7.1.ppc64le", "product": { "name": "ecryptfs-utils-103-7.1.ppc64le", "product_id": "ecryptfs-utils-103-7.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-103-7.1.s390x", "product": { "name": "ecryptfs-utils-103-7.1.s390x", "product_id": "ecryptfs-utils-103-7.1.s390x" } }, { "category": "product_version", "name": "ecryptfs-utils-32bit-103-7.1.s390x", "product": { "name": "ecryptfs-utils-32bit-103-7.1.s390x", "product_id": "ecryptfs-utils-32bit-103-7.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-103-7.1.x86_64", "product": { "name": "ecryptfs-utils-103-7.1.x86_64", "product_id": "ecryptfs-utils-103-7.1.x86_64" } }, { "category": "product_version", "name": "ecryptfs-utils-32bit-103-7.1.x86_64", "product": { "name": "ecryptfs-utils-32bit-103-7.1.x86_64", "product_id": "ecryptfs-utils-32bit-103-7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-32bit-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.ppc64le" }, "product_reference": "ecryptfs-utils-103-7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.s390x" }, "product_reference": "ecryptfs-utils-103-7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.s390x" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.ppc64le" }, "product_reference": "ecryptfs-utils-103-7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.s390x" }, "product_reference": "ecryptfs-utils-103-7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.s390x" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.ppc64le" }, "product_reference": "ecryptfs-utils-103-7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.s390x" }, "product_reference": "ecryptfs-utils-103-7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.ppc64le" }, "product_reference": "ecryptfs-utils-103-7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.s390x" }, "product_reference": "ecryptfs-utils-103-7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-103-7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-103-7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64" }, "product_reference": "ecryptfs-utils-32bit-103-7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9687" } ], "notes": [ { "category": "general", "text": "eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9687", "url": "https://www.suse.com/security/cve/CVE-2014-9687" }, { "category": "external", "summary": "SUSE Bug 920160 for CVE-2014-9687", "url": "https://bugzilla.suse.com/920160" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-01-25T16:34:16Z", "details": "moderate" } ], "title": "CVE-2014-9687" }, { "cve": "CVE-2016-1572", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1572" } ], "notes": [ { "category": "general", "text": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1572", "url": "https://www.suse.com/security/cve/CVE-2016-1572" }, { "category": "external", "summary": "SUSE Bug 962052 for CVE-2016-1572", "url": "https://bugzilla.suse.com/962052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Desktop 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server 12:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ecryptfs-utils-32bit-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-103-7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ecryptfs-utils-32bit-103-7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-01-25T16:34:16Z", "details": "moderate" } ], "title": "CVE-2016-1572" } ] }
opensuse-su-2024:10118-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ecryptfs-utils-108-2.5 on GA media
Notes
Title of the patch
ecryptfs-utils-108-2.5 on GA media
Description of the patch
These are all security issues fixed in the ecryptfs-utils-108-2.5 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10118
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ecryptfs-utils-108-2.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ecryptfs-utils-108-2.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10118", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10118-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1831 page", "url": "https://www.suse.com/security/cve/CVE-2011-1831/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1832 page", "url": "https://www.suse.com/security/cve/CVE-2011-1832/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1833 page", "url": "https://www.suse.com/security/cve/CVE-2011-1833/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1834 page", "url": "https://www.suse.com/security/cve/CVE-2011-1834/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1835 page", "url": "https://www.suse.com/security/cve/CVE-2011-1835/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1836 page", "url": "https://www.suse.com/security/cve/CVE-2011-1836/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1837 page", "url": "https://www.suse.com/security/cve/CVE-2011-1837/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9687 page", "url": "https://www.suse.com/security/cve/CVE-2014-9687/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1572 page", "url": "https://www.suse.com/security/cve/CVE-2016-1572/" } ], "title": "ecryptfs-utils-108-2.5 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10118-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-108-2.5.aarch64", "product": { "name": "ecryptfs-utils-108-2.5.aarch64", "product_id": "ecryptfs-utils-108-2.5.aarch64" } }, { "category": "product_version", "name": "ecryptfs-utils-32bit-108-2.5.aarch64", "product": { "name": "ecryptfs-utils-32bit-108-2.5.aarch64", "product_id": "ecryptfs-utils-32bit-108-2.5.aarch64" } }, { "category": "product_version", "name": "ecryptfs-utils-devel-108-2.5.aarch64", "product": { "name": "ecryptfs-utils-devel-108-2.5.aarch64", "product_id": "ecryptfs-utils-devel-108-2.5.aarch64" } }, { "category": "product_version", "name": "ecryptfs-utils-devel-32bit-108-2.5.aarch64", "product": { "name": "ecryptfs-utils-devel-32bit-108-2.5.aarch64", "product_id": "ecryptfs-utils-devel-32bit-108-2.5.aarch64" } }, { "category": "product_version", "name": "libecryptfs1-108-2.5.aarch64", "product": { "name": "libecryptfs1-108-2.5.aarch64", "product_id": "libecryptfs1-108-2.5.aarch64" } }, { "category": "product_version", "name": "libecryptfs1-32bit-108-2.5.aarch64", "product": { "name": "libecryptfs1-32bit-108-2.5.aarch64", "product_id": "libecryptfs1-32bit-108-2.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-108-2.5.ppc64le", "product": { "name": "ecryptfs-utils-108-2.5.ppc64le", "product_id": "ecryptfs-utils-108-2.5.ppc64le" } }, { "category": "product_version", "name": "ecryptfs-utils-32bit-108-2.5.ppc64le", "product": { "name": "ecryptfs-utils-32bit-108-2.5.ppc64le", "product_id": "ecryptfs-utils-32bit-108-2.5.ppc64le" } }, { "category": "product_version", "name": "ecryptfs-utils-devel-108-2.5.ppc64le", "product": { "name": "ecryptfs-utils-devel-108-2.5.ppc64le", "product_id": "ecryptfs-utils-devel-108-2.5.ppc64le" } }, { "category": "product_version", "name": "ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "product": { "name": "ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "product_id": "ecryptfs-utils-devel-32bit-108-2.5.ppc64le" } }, { "category": "product_version", "name": "libecryptfs1-108-2.5.ppc64le", "product": { "name": "libecryptfs1-108-2.5.ppc64le", "product_id": "libecryptfs1-108-2.5.ppc64le" } }, { "category": "product_version", "name": "libecryptfs1-32bit-108-2.5.ppc64le", "product": { "name": "libecryptfs1-32bit-108-2.5.ppc64le", "product_id": "libecryptfs1-32bit-108-2.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-108-2.5.s390x", "product": { "name": "ecryptfs-utils-108-2.5.s390x", "product_id": "ecryptfs-utils-108-2.5.s390x" } }, { "category": "product_version", "name": "ecryptfs-utils-32bit-108-2.5.s390x", "product": { "name": "ecryptfs-utils-32bit-108-2.5.s390x", "product_id": "ecryptfs-utils-32bit-108-2.5.s390x" } }, { "category": "product_version", "name": "ecryptfs-utils-devel-108-2.5.s390x", "product": { "name": "ecryptfs-utils-devel-108-2.5.s390x", "product_id": "ecryptfs-utils-devel-108-2.5.s390x" } }, { "category": "product_version", "name": "ecryptfs-utils-devel-32bit-108-2.5.s390x", "product": { "name": "ecryptfs-utils-devel-32bit-108-2.5.s390x", "product_id": "ecryptfs-utils-devel-32bit-108-2.5.s390x" } }, { "category": "product_version", "name": "libecryptfs1-108-2.5.s390x", "product": { "name": "libecryptfs1-108-2.5.s390x", "product_id": "libecryptfs1-108-2.5.s390x" } }, { "category": "product_version", "name": "libecryptfs1-32bit-108-2.5.s390x", "product": { "name": "libecryptfs1-32bit-108-2.5.s390x", "product_id": "libecryptfs1-32bit-108-2.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ecryptfs-utils-108-2.5.x86_64", "product": { "name": "ecryptfs-utils-108-2.5.x86_64", "product_id": "ecryptfs-utils-108-2.5.x86_64" } }, { "category": "product_version", "name": "ecryptfs-utils-32bit-108-2.5.x86_64", "product": { "name": "ecryptfs-utils-32bit-108-2.5.x86_64", "product_id": "ecryptfs-utils-32bit-108-2.5.x86_64" } }, { "category": "product_version", "name": "ecryptfs-utils-devel-108-2.5.x86_64", "product": { "name": "ecryptfs-utils-devel-108-2.5.x86_64", "product_id": "ecryptfs-utils-devel-108-2.5.x86_64" } }, { "category": "product_version", "name": "ecryptfs-utils-devel-32bit-108-2.5.x86_64", "product": { "name": "ecryptfs-utils-devel-32bit-108-2.5.x86_64", "product_id": "ecryptfs-utils-devel-32bit-108-2.5.x86_64" } }, { "category": "product_version", "name": "libecryptfs1-108-2.5.x86_64", "product": { "name": "libecryptfs1-108-2.5.x86_64", "product_id": "libecryptfs1-108-2.5.x86_64" } }, { "category": "product_version", "name": "libecryptfs1-32bit-108-2.5.x86_64", "product": { "name": "libecryptfs1-32bit-108-2.5.x86_64", "product_id": "libecryptfs1-32bit-108-2.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-108-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64" }, "product_reference": "ecryptfs-utils-108-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-108-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le" }, "product_reference": "ecryptfs-utils-108-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-108-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x" }, "product_reference": "ecryptfs-utils-108-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-108-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64" }, "product_reference": "ecryptfs-utils-108-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-108-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64" }, "product_reference": "ecryptfs-utils-32bit-108-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-108-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le" }, "product_reference": "ecryptfs-utils-32bit-108-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-108-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x" }, "product_reference": "ecryptfs-utils-32bit-108-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-32bit-108-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64" }, "product_reference": "ecryptfs-utils-32bit-108-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-devel-108-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64" }, "product_reference": "ecryptfs-utils-devel-108-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-devel-108-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le" }, "product_reference": "ecryptfs-utils-devel-108-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-devel-108-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x" }, "product_reference": "ecryptfs-utils-devel-108-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-devel-108-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64" }, "product_reference": "ecryptfs-utils-devel-108-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-devel-32bit-108-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64" }, "product_reference": "ecryptfs-utils-devel-32bit-108-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-devel-32bit-108-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le" }, "product_reference": "ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-devel-32bit-108-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x" }, "product_reference": "ecryptfs-utils-devel-32bit-108-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ecryptfs-utils-devel-32bit-108-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64" }, "product_reference": "ecryptfs-utils-devel-32bit-108-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libecryptfs1-108-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64" }, "product_reference": "libecryptfs1-108-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libecryptfs1-108-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le" }, "product_reference": "libecryptfs1-108-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libecryptfs1-108-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x" }, "product_reference": "libecryptfs1-108-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libecryptfs1-108-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64" }, "product_reference": "libecryptfs1-108-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libecryptfs1-32bit-108-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64" }, "product_reference": "libecryptfs1-32bit-108-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libecryptfs1-32bit-108-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le" }, "product_reference": "libecryptfs1-32bit-108-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libecryptfs1-32bit-108-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x" }, "product_reference": "libecryptfs1-32bit-108-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libecryptfs1-32bit-108-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" }, "product_reference": "libecryptfs1-32bit-108-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-1831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1831" } ], "notes": [ { "category": "general", "text": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1831", "url": "https://www.suse.com/security/cve/CVE-2011-1831" }, { "category": "external", "summary": "SUSE Bug 709771 for CVE-2011-1831", "url": "https://bugzilla.suse.com/709771" }, { "category": "external", "summary": "SUSE Bug 711539 for CVE-2011-1831", "url": "https://bugzilla.suse.com/711539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-1831" }, { "cve": "CVE-2011-1832", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1832" } ], "notes": [ { "category": "general", "text": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1832", "url": "https://www.suse.com/security/cve/CVE-2011-1832" }, { "category": "external", "summary": "SUSE Bug 709771 for CVE-2011-1832", "url": "https://bugzilla.suse.com/709771" }, { "category": "external", "summary": "SUSE Bug 711539 for CVE-2011-1832", "url": "https://bugzilla.suse.com/711539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-1832" }, { "cve": "CVE-2011-1833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1833" } ], "notes": [ { "category": "general", "text": "Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1833", "url": "https://www.suse.com/security/cve/CVE-2011-1833" }, { "category": "external", "summary": "SUSE Bug 709771 for CVE-2011-1833", "url": "https://bugzilla.suse.com/709771" }, { "category": "external", "summary": "SUSE Bug 711539 for CVE-2011-1833", "url": "https://bugzilla.suse.com/711539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1833" }, { "cve": "CVE-2011-1834", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1834" } ], "notes": [ { "category": "general", "text": "utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1834", "url": "https://www.suse.com/security/cve/CVE-2011-1834" }, { "category": "external", "summary": "SUSE Bug 709771 for CVE-2011-1834", "url": "https://bugzilla.suse.com/709771" }, { "category": "external", "summary": "SUSE Bug 711539 for CVE-2011-1834", "url": "https://bugzilla.suse.com/711539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-1834" }, { "cve": "CVE-2011-1835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1835" } ], "notes": [ { "category": "general", "text": "The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain time in the new-user creation steps.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1835", "url": "https://www.suse.com/security/cve/CVE-2011-1835" }, { "category": "external", "summary": "SUSE Bug 709771 for CVE-2011-1835", "url": "https://bugzilla.suse.com/709771" }, { "category": "external", "summary": "SUSE Bug 711539 for CVE-2011-1835", "url": "https://bugzilla.suse.com/711539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-1835" }, { "cve": "CVE-2011-1836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1836" } ], "notes": [ { "category": "general", "text": "utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1836", "url": "https://www.suse.com/security/cve/CVE-2011-1836" }, { "category": "external", "summary": "SUSE Bug 709771 for CVE-2011-1836", "url": "https://bugzilla.suse.com/709771" }, { "category": "external", "summary": "SUSE Bug 711539 for CVE-2011-1836", "url": "https://bugzilla.suse.com/711539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1836" }, { "cve": "CVE-2011-1837", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1837" } ], "notes": [ { "category": "general", "text": "The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1837", "url": "https://www.suse.com/security/cve/CVE-2011-1837" }, { "category": "external", "summary": "SUSE Bug 709771 for CVE-2011-1837", "url": "https://bugzilla.suse.com/709771" }, { "category": "external", "summary": "SUSE Bug 711539 for CVE-2011-1837", "url": "https://bugzilla.suse.com/711539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-1837" }, { "cve": "CVE-2014-9687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9687" } ], "notes": [ { "category": "general", "text": "eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9687", "url": "https://www.suse.com/security/cve/CVE-2014-9687" }, { "category": "external", "summary": "SUSE Bug 920160 for CVE-2014-9687", "url": "https://bugzilla.suse.com/920160" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9687" }, { "cve": "CVE-2016-1572", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1572" } ], "notes": [ { "category": "general", "text": "mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1572", "url": "https://www.suse.com/security/cve/CVE-2016-1572" }, { "category": "external", "summary": "SUSE Bug 962052 for CVE-2016-1572", "url": "https://bugzilla.suse.com/962052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-108-2.5.x86_64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.s390x", "openSUSE Tumbleweed:ecryptfs-utils-devel-32bit-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-108-2.5.x86_64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.aarch64", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.ppc64le", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.s390x", "openSUSE Tumbleweed:libecryptfs1-32bit-108-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1572" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…