First published: Wed May 14 2014(Updated: )
A number of issues were found in the cryptography practices of EncFS. These are detailed in the following audit: <a href="https://defuse.ca/audits/encfs.htm">https://defuse.ca/audits/encfs.htm</a> It also notes some of the issues in <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2010-3073 CVE-2010-3074 CVE-2010-3075 fuse-encfs: EncFS: Multiple flaws" href="show_bug.cgi?id=630460">bug 630460</a> may not be fixed correctly. A fix is currently not available. Fedora and EPEL use a 1.x version. A future 2.0 release may correct these issues: <a href="https://code.google.com/p/encfs/issues/detail?id=186">https://code.google.com/p/encfs/issues/detail?id=186</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =42.1 | |
openSUSE | =42.2 | |
openSUSE | =13.2 | |
encfs project encfs | <1.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3462 is considered to have a critical severity due to significant cryptographic flaws.
To address CVE-2014-3462, it is recommended to upgrade to EncFS version 1.7.6 or later.
CVE-2014-3462 affects versions of EncFS up to 1.7.5 and specific versions of openSUSE such as 13.2, 42.1, and 42.2.
Yes, CVE-2014-3462 is a known vulnerability documented in various security audits and reports.
The implications of CVE-2014-3462 include potential unauthorized data access due to weak cryptographic practices.