First published: Fri Jul 22 2016(Updated: )
ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
eCryptfs-utils | <=110 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6224 is considered a high severity vulnerability due to the risk of exposing sensitive information by local users.
To fix CVE-2016-6224, ensure that swap partitions are encrypted and properly configured to prevent unencrypted activation.
CVE-2016-6224 affects eCryptfs-utils versions up to 110 and specific releases of Ubuntu Linux including 14.04 and 15.10.
CVE-2016-6224 impacts systems using GPT partitioning on NVMe or MMC drives.
CVE-2016-6224 allows information leakage because unencrypted swap partitions can become active during the boot process, exposing sensitive data.