CVE-2011-1831
- EPSS 0.04%
- Published 15.02.2014 14:57:06
- Last modified 11.04.2025 00:51:21
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call.
CVE-2011-1832
- EPSS 0.04%
- Published 15.02.2014 14:57:06
- Last modified 11.04.2025 00:51:21
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call.
CVE-2011-1834
- EPSS 0.06%
- Published 15.02.2014 14:57:06
- Last modified 11.04.2025 00:51:21
utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umo...
CVE-2011-1835
- EPSS 0.06%
- Published 15.02.2014 14:57:06
- Last modified 11.04.2025 00:51:21
The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain ...
CVE-2011-1836
- EPSS 0.05%
- Published 15.02.2014 14:57:06
- Last modified 11.04.2025 00:51:21
utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process.
CVE-2011-1837
- EPSS 0.05%
- Published 15.02.2014 14:57:06
- Last modified 11.04.2025 00:51:21
The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.
CVE-2008-5188
- EPSS 0.04%
- Published 21.11.2008 02:30:00
- Last modified 09.04.2025 00:30:58
The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive inform...