drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Verwendung schwacher Verschlüsselung in eCryptfs
Name: |
Verwendung schwacher Verschlüsselung in eCryptfs |
|
ID: |
USN-2524-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10 |
|
Datum: |
Mi, 11. März 2015, 06:35 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9687 |
|
Applikationen: |
eCryptfs |
|
Originalnachricht |
--===============4014012589148286674== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="sm4nu43k4a2Rpi4c" Content-Disposition: inline
--sm4nu43k4a2Rpi4c Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-2524-1 March 11, 2015
ecryptfs-utils vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS
Summary:
Sensitive information in encrypted home and Private directories could be exposed if an attacker gained access to your files.
Software Description: - ecryptfs-utils: eCryptfs cryptographic filesystem utilities
Details:
Sylvain Pelissier discovered that eCryptfs did not generate a random salt when encrypting the mount passphrase with the login password. An attacker could use this issue to discover the login password used to protect the mount passphrase and gain unintended access to the encrypted files.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.10: ecryptfs-utils 104-0ubuntu1.14.10.3 libecryptfs0 104-0ubuntu1.14.10.3
Ubuntu 14.04 LTS: ecryptfs-utils 104-0ubuntu1.14.04.3 libecryptfs0 104-0ubuntu1.14.04.3
Ubuntu 12.04 LTS: ecryptfs-utils 96-0ubuntu3.4 libecryptfs0 96-0ubuntu3.4
Ubuntu 10.04 LTS: ecryptfs-utils 83-0ubuntu3.2.10.04.6 libecryptfs0 83-0ubuntu3.2.10.04.6
After a standard system update you need to log out of all sessions and then log back in to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2524-1 CVE-2014-9687
Package Information: https://launchpad.net/ubuntu/+source/ecryptfs-utils/104-0ubuntu1.14.10.3 https://launchpad.net/ubuntu/+source/ecryptfs-utils/104-0ubuntu1.14.04.3 https://launchpad.net/ubuntu/+source/ecryptfs-utils/96-0ubuntu3.4 https://launchpad.net/ubuntu/+source/ecryptfs-utils/83-0ubuntu3.2.10.04.6
--sm4nu43k4a2Rpi4c Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJU/5FrAAoJENaSAD2qAscKmtYQAIPQlFczW9sSZvfYaJ0WuyAx Xo5e4Z7Vj7qpltAh2WC5ijidaOp7FCjusRrlkMmWvKUmjFfWDTNQKyjh613Ees0F 9Wj37IM+fOIPeZWZEG4tN1TH4uXIdtgFwt0kcByw+mtDMRrJ5evahM5IBnfoon4Q W/nv9kHosY+90tQltYDH8MZkVkCnzAG582ihfweKWZC9OQU61ByXjp6ddagHlNFh bGzrlc+k4j7i24ll6fuZf4QQ+TKOwYwjBI02i/1rzJ0J3tnjKm0g/8sDsVyDMLKh Gda8PADXK7Z4XWDrrsz/HcxX2B83RrR4oiR8eTfe7HCyeNHezM455xW+O9ROPrxK 0NBgP7z8szfwA9TOfbRtTnhVMwjv0U/TANPFompOOkRJAgRMGsL8pZwXU7HaW6+t yujeEQ8ye01b0VY9HZ7OVYkwlyS5EXLYsVwlsjngFWEDAah4xOBvncemVBFPiCVr GaZaNG5yu6yP+pfT1HEsaUXo1OG+9RxXHeOvyfxgIKOgEmq0YDse4ChYBZWrN5PV TqTEyBsMjUoBQg/dmseKi/kcoE0MLkJjgwuG5PvCq9XZO1OhQjAfmZYaJQj1L234 3bLVJv5JZCJpc2HHp0MymnEqk7T1pvKZDw8l7Jel1ISuAVZnDf5KF8eOMSDVgLr4 0UEnyf9XNHvRORpQRZ1R =M9IX -----END PGP SIGNATURE-----
--sm4nu43k4a2Rpi4c--
--===============4014012589148286674== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============4014012589148286674==--
|
|
|
|