Ecryptfs

Ecryptfs-utils

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 20.12.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 01:40:48

ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation

  • EPSS 0.06%
  • Veröffentlicht 22.07.2016 14:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors. ...

  • EPSS 0.12%
  • Veröffentlicht 22.07.2016 14:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecifi...

  • EPSS 0.05%
  • Veröffentlicht 22.01.2016 15:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.

Exploit
  • EPSS 0.52%
  • Veröffentlicht 16.03.2015 14:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.

  • EPSS 0.04%
  • Veröffentlicht 15.02.2014 14:57:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call.

  • EPSS 0.04%
  • Veröffentlicht 15.02.2014 14:57:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call.

  • EPSS 0.06%
  • Veröffentlicht 15.02.2014 14:57:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umo...

  • EPSS 0.06%
  • Veröffentlicht 15.02.2014 14:57:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain ...

  • EPSS 0.05%
  • Veröffentlicht 15.02.2014 14:57:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process.