Bug 1193091 (CVE-2014-9687)

Summary: CVE-2014-9687 ecryptfs-utils: default salt is used for wrapping passphrase
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: esandeen, mhlavink
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-03-03 05:16:27 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1193092    
Bug Blocks: 1193093    

Description Vasyl Kaigorodov 2015-02-16 14:48:23 UTC
It was reported [1] that by default, if no salt=/passphrase_salt= stanza supplied, standard eCryptfs configuration set up by ecryptfs-setup-private has a security implication: all installations end up wrapping (encrypting) the mount passphrase with the user login password and the default salt value (0x0011223344556677).
This simplifies bruteforcing of an actual encryption key.
No patch is available at this time.

[1]: https://bugs.launchpad.net/ecryptfs/+bug/906550

Comment 1 Vasyl Kaigorodov 2015-02-16 14:48:41 UTC
Created ecryptfs-utils tracking bugs for this issue:

Affects: fedora-all [bug 1193092]

Comment 2 Martin Prpič 2015-03-02 11:09:23 UTC
CVE assignment:

http://seclists.org/oss-sec/2015/q1/706