Ecryptfs Ecryptfs-Utils vulnerabilities
15 known vulnerabilities affecting ecryptfs/ecryptfs-utils.
Total CVEs
15
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH3MEDIUM4LOW7
Vulnerabilities
Page 1 of 1
CVE-2012-3409HIGHCVSS 7.8≥ 86, < 992019-12-20
CVE-2012-3409 [HIGH] CWE-20 CVE-2012-3409: ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a
ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation
nvdosv
CVE-2011-3145CRITICALCVSS 9.8≥ 0, < 92-12019-04-22
CVE-2011-3145 [CRITICAL] CVE-2011-3145: When mount
When mount.ecrpytfs_private before version 87-0ubuntu1.2 calls setreuid() it doesn't also set the effective group id. So when it creates the new version, mtab.tmp, it's created with the group id of the user running mount.ecryptfs_private.
osv
CVE-2016-6224LOWCVSS 3.3≤ 1102016-07-22
CVE-2016-6224 [LOW] CVE-2016-6224: ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating duri
ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946.
nvdosv
CVE-2015-8946LOWCVSS 3.3≤ 1102016-07-22
CVE-2015-8946 [LOW] CWE-20 CVE-2015-8946: ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from acti
ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors.
nvdosv
CVE-2016-1572HIGHCVSS 8.4fixed in 1092016-01-22
CVE-2016-1572 [HIGH] CWE-269 CVE-2016-1572: mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, whi
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
nvdosv
CVE-2014-9687MEDIUMCVSS 5.0≤ 1042015-03-16
CVE-2014-9687 [MEDIUM] CWE-255 CVE-2014-9687: eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier
eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
nvdosv
CVE-2011-1836MEDIUMCVSS 4.6≤ 89v62+25 more2014-02-15
CVE-2011-1836 [MEDIUM] CWE-264 CVE-2011-1836: utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with sa
utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process.
nvdosv
CVE-2011-1835MEDIUMCVSS 4.4≤ 89v62+25 more2014-02-15
CVE-2011-1835 [MEDIUM] CWE-255 CVE-2011-1835: The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils befo
The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain time in the new-user creation steps.
nvdosv
CVE-2011-1831MEDIUMCVSS 4.6≤ 89v62+25 more2014-02-15
CVE-2011-1831 [MEDIUM] CWE-264 CVE-2011-1831: utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permis
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call.
nvdosv
CVE-2011-1832LOWCVSS 2.1≤ 89v62+25 more2014-02-15
CVE-2011-1832 [LOW] CWE-264 CVE-2011-1832: utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permis
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call.
nvdosv
CVE-2011-1834LOWCVSS 2.1≤ 89v62+25 more2014-02-15
CVE-2011-1834 [LOW] CWE-264 CVE-2011-1834: utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call.
nvdosv
CVE-2011-1837LOWCVSS 3.6≤ 89v62+25 more2014-02-15
CVE-2011-1837 [LOW] CWE-264 CVE-2011-1837: The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows
The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.
nvdosv
CVE-2011-1833LOWCVSS 3.3≥ 0, < 92-12012-10-03
CVE-2011-1833 [LOW] CVE-2011-1833: Race condition in the ecryptfs_mount function in fs/ecryptfs/main
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
osv
CVE-2009-1296LOWCVSS 1.9≥ 0, < 75-22009-06-09
CVE-2009-1296 [LOW] CVE-2009-1296: The eCryptfs support utilities (ecryptfs-utils) 73-0ubuntu6
The eCryptfs support utilities (ecryptfs-utils) 73-0ubuntu6.1 on Ubuntu 9.04 stores the mount passphrase in installation logs, which might allow local users to obtain access to the filesystem by reading the log files from disk. NOTE: the log files are only readable by root.
osv
CVE-2008-5188HIGHCVSS 7.2≥ 0, < 66-12008-11-21
CVE-2008-5188 [HIGH] CVE-2008-5188: The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped
The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.
osv