Login
Newsletter
Werbung

Sicherheit: Verwendung schwacher Verschlüsselung in eCryptfs
Aktuelle Meldungen Distributionen
Name: Verwendung schwacher Verschlüsselung in eCryptfs
ID: USN-2524-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10
Datum: Mi, 11. März 2015, 06:35
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9687
Applikationen: eCryptfs

Originalnachricht


--===============4014012589148286674==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="sm4nu43k4a2Rpi4c"
Content-Disposition: inline


--sm4nu43k4a2Rpi4c
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-2524-1
March 11, 2015

ecryptfs-utils vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Sensitive information in encrypted home and Private directories could be
exposed if an attacker gained access to your files.

Software Description:
- ecryptfs-utils: eCryptfs cryptographic filesystem utilities

Details:

Sylvain Pelissier discovered that eCryptfs did not generate a random salt when
encrypting the mount passphrase with the login password. An attacker could use
this issue to discover the login password used to protect the mount passphrase
and gain unintended access to the encrypted files.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
ecryptfs-utils 104-0ubuntu1.14.10.3
libecryptfs0 104-0ubuntu1.14.10.3

Ubuntu 14.04 LTS:
ecryptfs-utils 104-0ubuntu1.14.04.3
libecryptfs0 104-0ubuntu1.14.04.3

Ubuntu 12.04 LTS:
ecryptfs-utils 96-0ubuntu3.4
libecryptfs0 96-0ubuntu3.4

Ubuntu 10.04 LTS:
ecryptfs-utils 83-0ubuntu3.2.10.04.6
libecryptfs0 83-0ubuntu3.2.10.04.6

After a standard system update you need to log out of all sessions and then log
back in to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2524-1
CVE-2014-9687

Package Information:
https://launchpad.net/ubuntu/+source/ecryptfs-utils/104-0ubuntu1.14.10.3
https://launchpad.net/ubuntu/+source/ecryptfs-utils/104-0ubuntu1.14.04.3
https://launchpad.net/ubuntu/+source/ecryptfs-utils/96-0ubuntu3.4
https://launchpad.net/ubuntu/+source/ecryptfs-utils/83-0ubuntu3.2.10.04.6


--sm4nu43k4a2Rpi4c
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=M9IX
-----END PGP SIGNATURE-----

--sm4nu43k4a2Rpi4c--


--===============4014012589148286674==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4014012589148286674==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung