Search CVE reports


Toggle filters

1 – 10 of 15 results


CVE-2012-3409

Low priority
Ignored

ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils Not affected Not affected Not affected
Show less packages

CVE-2016-6224

Medium priority
Fixed

ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via...

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils Fixed
Show less packages

CVE-2015-8946

Medium priority
Not affected

ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain...

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils Not affected
Show less packages

CVE-2016-1572

Medium priority
Fixed

mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils
Show less packages

CVE-2014-9687

Medium priority
Fixed

eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils
Show less packages

CVE-2011-3145

Medium priority
Fixed

When mount.ecrpytfs_private before version 87-0ubuntu1.2 calls setreuid() it doesn't also set the effective group id. So when it creates the new version, mtab.tmp, it's created with the group id of the user running mount.ecryptfs_private.

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils
Show less packages

CVE-2011-1837

Medium priority
Fixed

The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils
Show less packages

CVE-2011-1836

Low priority
Fixed

utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the...

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils
Show less packages

CVE-2011-1835

Medium priority
Fixed

The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access...

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils
Show less packages

CVE-2011-1834

Medium priority
Fixed

utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting...

1 affected package

ecryptfs-utils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
ecryptfs-utils
Show less packages