CVE-2015-8946
Published: 22 July 2016
ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors.
Notes
Author | Note |
---|---|
tyhicks | This issue only occurs when systemd and GPT partitioning is in use |
Priority
Status
Package | Release | Status |
---|---|---|
ecryptfs-utils Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(systemd not in use)
|
trusty |
Not vulnerable
(systemd not in use)
|
|
upstream |
Released
(108)
|
|
wily |
Not vulnerable
(108-0ubuntu1.2)
|
|
xenial |
Not vulnerable
|
|
Patches: upstream: https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.3 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |