CVE-2016-1572

mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*

History

23 Mar 2022, 17:19

Type Values Removed Values Added
CWE CWE-264 CWE-269
References (MLIST) http://www.openwall.com/lists/oss-security/2016/01/20/6 - (MLIST) http://www.openwall.com/lists/oss-security/2016/01/20/6 - Mailing List, Third Party Advisory
References (CONFIRM) https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870 - Vendor Advisory (CONFIRM) https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870 - Patch, Third Party Advisory
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html - Mailing List, Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2016/dsa-3450 - Patch (DEBIAN) http://www.debian.org/security/2016/dsa-3450 - Patch, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html - Mailing List, Third Party Advisory
References (CONFIRM) https://bugs.launchpad.net/ecryptfs/+bug/1530566 - Vendor Advisory (CONFIRM) https://bugs.launchpad.net/ecryptfs/+bug/1530566 - Issue Tracking, Patch, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html - Mailing List, Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1034791 - (SECTRACK) http://www.securitytracker.com/id/1034791 - Broken Link, Third Party Advisory, VDB Entry
References (UBUNTU) http://www.ubuntu.com/usn/USN-2876-1 - Patch (UBUNTU) http://www.ubuntu.com/usn/USN-2876-1 - Patch, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html - Mailing List, Third Party Advisory
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

Information

Published : 2016-01-22 15:59

Updated : 2024-02-04 18:53


NVD link : CVE-2016-1572

Mitre link : CVE-2016-1572

CVE.ORG link : CVE-2016-1572


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • opensuse
  • leap

canonical

  • ubuntu_linux

ecryptfs

  • ecryptfs-utils

fedoraproject

  • fedora
CWE
CWE-269

Improper Privilege Management