Total vulnerabilities in the database
The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.
Software | From | Fixed in |
---|---|---|
ecryptfs / ecryptfs_utils | 49 | 49.x |
ecryptfs / ecryptfs_utils | 55 | 55.x |
ecryptfs / ecryptfs_utils | 51 | 51.x |
ecryptfs / ecryptfs_utils | 57 | 57.x |
ecryptfs / ecryptfs_utils | 47 | 47.x |
ecryptfs / ecryptfs_utils | 60 | 60.x |
ecryptfs / ecryptfs_utils | 58 | 58.x |
ecryptfs / ecryptfs_utils | 50 | 50.x |
ecryptfs / ecryptfs_utils | 61 | 61.x |
ecryptfs / ecryptfs_utils | 45 | 45.x |
ecryptfs / ecryptfs_utils | 54 | 54.x |
ecryptfs / ecryptfs_utils | 53 | 53.x |
ecryptfs / ecryptfs_utils | 46 | 46.x |
ecryptfs / ecryptfs_utils | 56 | 56.x |
ecryptfs / ecryptfs_utils | 59 | 59.x |
ecryptfs / ecryptfs_utils | 48 | 48.x |