Upstream information

CVE-2016-1572 at MITRE

Description

mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.

SUSE information

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 4.64 6.00
Vector AV:L/AC:L/Au:N/C:P/I:P/A:P AV:L/AC:M/Au:S/C:C/I:C/A:N
Access Vector Local Local
Access Complexity Low Medium
Authentication None Single
Confidentiality Impact Partial Complete
Integrity Impact Partial Complete
Availability Impact Partial None
CVSS v3 Scores
  National Vulnerability Database
Base Score 8.4
Vector AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Access Vector Local
Access Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
SUSE Bugzilla entry: 962052 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 11 SP3
  • ecryptfs-utils >= 61-1.35.1
  • ecryptfs-utils-32bit >= 61-1.35.1
Patchnames:
sledsp3-ecryptfs-utils-12379
SUSE Linux Enterprise Desktop 11 SP4
  • ecryptfs-utils >= 61-1.35.1
  • ecryptfs-utils-32bit >= 61-1.35.1
Patchnames:
sledsp4-ecryptfs-utils-12379
SUSE Linux Enterprise Desktop 12
  • ecryptfs-utils >= 103-7.1
  • ecryptfs-utils-32bit >= 103-7.1
Patchnames:
SUSE-SLE-DESKTOP-12-2016-153
SUSE Linux Enterprise Desktop 12 SP1
  • ecryptfs-utils >= 103-7.1
  • ecryptfs-utils-32bit >= 103-7.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP1-2016-153
SUSE Linux Enterprise Desktop 12 SP2
  • ecryptfs-utils >= 103-7.1
  • ecryptfs-utils-32bit >= 103-7.1
Patchnames:
SUSE Linux Enterprise Desktop 12 SP2 GA ecryptfs-utils
SUSE Linux Enterprise Server 11 SP3
  • ecryptfs-utils >= 61-1.35.1
  • ecryptfs-utils-32bit >= 61-1.35.1
  • ecryptfs-utils-x86 >= 61-1.35.1
Patchnames:
slessp3-ecryptfs-utils-12379
SUSE Linux Enterprise Server 11 SP4
  • ecryptfs-utils >= 61-1.35.1
  • ecryptfs-utils-32bit >= 61-1.35.1
  • ecryptfs-utils-x86 >= 61-1.35.1
Patchnames:
slessp4-ecryptfs-utils-12379
SUSE Linux Enterprise Server 12
  • ecryptfs-utils >= 103-7.1
  • ecryptfs-utils-32bit >= 103-7.1
Patchnames:
SUSE-SLE-SERVER-12-2016-153
SUSE Linux Enterprise Server 12 SP1
  • ecryptfs-utils >= 103-7.1
  • ecryptfs-utils-32bit >= 103-7.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2016-153
SUSE Linux Enterprise Server 12 SP2
  • ecryptfs-utils >= 103-7.1
  • ecryptfs-utils-32bit >= 103-7.1
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA ecryptfs-utils
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • ecryptfs-utils >= 103-7.1
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA ecryptfs-utils
SUSE Linux Enterprise Server for VMWare 11 SP3
  • ecryptfs-utils >= 61-1.35.1
  • ecryptfs-utils-32bit >= 61-1.35.1
  • ecryptfs-utils-x86 >= 61-1.35.1
Patchnames:
slessp3-ecryptfs-utils-12379
openSUSE 13.1
  • ecryptfs-utils >= 104-3.3.1
  • ecryptfs-utils-32bit >= 104-3.3.1
  • ecryptfs-utils-debuginfo >= 104-3.3.1
  • ecryptfs-utils-debuginfo-32bit >= 104-3.3.1
  • ecryptfs-utils-debugsource >= 104-3.3.1
Patchnames:
2016-125
openSUSE 13.2
  • ecryptfs-utils >= 104-3.1
  • ecryptfs-utils-32bit >= 104-3.1
  • ecryptfs-utils-debuginfo >= 104-3.1
  • ecryptfs-utils-debuginfo-32bit >= 104-3.1
  • ecryptfs-utils-debugsource >= 104-3.1
Patchnames:
openSUSE-2016-93
openSUSE Leap 42.1
  • ecryptfs-utils >= 103-3.1
  • ecryptfs-utils-32bit >= 103-3.1
  • ecryptfs-utils-debuginfo >= 103-3.1
  • ecryptfs-utils-debuginfo-32bit >= 103-3.1
  • ecryptfs-utils-debugsource >= 103-3.1
Patchnames:
openSUSE-2016-119
openSUSE Tumbleweed
  • ecryptfs-utils >= 108-2.5
  • ecryptfs-utils-32bit >= 108-2.5
  • ecryptfs-utils-devel >= 108-2.5
  • ecryptfs-utils-devel-32bit >= 108-2.5
  • libecryptfs1 >= 108-2.5
  • libecryptfs1-32bit >= 108-2.5
Patchnames:
openSUSE Tumbleweed GA ecryptfs-utils