mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
23 Mar 2022, 17:19
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-269 | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2016/01/20/6 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870 - Patch, Third Party Advisory | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html - Mailing List, Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2016/dsa-3450 - Patch, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://bugs.launchpad.net/ecryptfs/+bug/1530566 - Issue Tracking, Patch, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html - Mailing List, Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1034791 - Broken Link, Third Party Advisory, VDB Entry | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-2876-1 - Patch, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html - Mailing List, Third Party Advisory | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* |
Information
Published : 2016-01-22 15:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-1572
Mitre link : CVE-2016-1572
CVE.ORG link : CVE-2016-1572
JSON object : View
Products Affected
debian
- debian_linux
opensuse
- opensuse
- leap
canonical
- ubuntu_linux
ecryptfs
- ecryptfs-utils
fedoraproject
- fedora
CWE
CWE-269
Improper Privilege Management