Bug 630460 (CVE-2010-3073, CVE-2010-3074, CVE-2010-3075)
Summary: | CVE-2010-3073 CVE-2010-3074 CVE-2010-3075 fuse-encfs: EncFS: Multiple flaws | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||
Severity: | low | Docs Contact: | |||||||
Priority: | low | ||||||||
Version: | unspecified | CC: | jokajak, lemenkov, mszpak | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2021-10-19 09:13:45 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Attachments: |
|
Description
Jan Lieskovsky
2010-09-05 18:09:59 UTC
Created attachment 443181 [details]
Local text copy of EncFS report from Full Disclosure
Created attachment 443182 [details]
Local copy of public proof of concept archive provided by Micha Riser in that Full Disclosure post
Issue "(2) Watermarking attack" affects the versions of the fuse-encfs package, as shipped with Fedora release of 12 and 13. Please fix (once patch [E] was confirmed to be the proper one to address this issue). Reply from Valient Gough regarding the patch in question (http://www.openwall.com/lists/oss-security/2010/09/06/1): Jan, Yes, the patch referenced in [F], specifically changes to SSL_Cipher.cpp, were made in response to issues (1) & (2). These are not backward compatible, and so only apply to new filesystems. Issue (3) is not directly addressed. A workaround is to enable per-block MAC headers, or per-block random bytes. A patch going into 1.7.2 allows per-block random bytes to be configured independently of MAC headers. It would be possible to change the default settings such that per-block random bytes are always used. Adding new encryption modes is not planned for encfs 1.x. regards, Valient (see http://www.openwall.com/lists/oss-security/2010/09/05/3 for slightly changed reference points). The following CVE identifiers have been assigned to these issues: 1, CVE-2010-3073 encfs Only 32 bit of file IV used 2, CVE-2010-3074 encfs Watermarking attack 3, CVE-2010-3075 encfs Last block with single byte is insecure Hello. Was this bug addressed properly? I found following lines in fuse-encfs-1.7.4-6.fc17.src.rpm's changelog: * Sun Sep 5 14:00:00 2010 Peter Lemenkov <lemenkov> - 1.7.1-1 - Fixed three security flaws (see rhbz #630460) - Cleaned up spec-file a little (In reply to comment #6) > Hello. Was this bug addressed properly? > > I found following lines in fuse-encfs-1.7.4-6.fc17.src.rpm's changelog: > * Sun Sep 5 14:00:00 2010 Peter Lemenkov <lemenkov> - 1.7.1-1 > - Fixed three security flaws (see rhbz #630460) > - Cleaned up spec-file a little Yes, it was. I built the very latest encfs version which is claimed to contain all the necessary fixes. |