Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.openwall.com/lists/oss-security/2016/07/14/3", "name": "[oss-security] 20160714 Re: CVE Requests: Information exposure caused by ecryptfs-setup-swap failures", "tags": [], "refsource": "MLIST"}, {"url": "http://www.openwall.com/lists/oss-security/2016/07/13/2", "name": "[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures", "tags": [], "refsource": "MLIST"}, {"url": "http://www.ubuntu.com/usn/USN-3032-1", "name": "USN-3032-1", "tags": ["Third Party Advisory"], "refsource": "UBUNTU"}, {"url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857", "name": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857", "tags": [], "refsource": "CONFIRM"}, {"url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282", "name": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282", "tags": [], "refsource": "CONFIRM"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-20"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2015-8946", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "LOW", "acInsufInfo": true, "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 3.3, "attackVector": "LOCAL", "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 1.8}}, "publishedDate": "2016-07-22T14:59Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "110"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2016-07-27T15:46Z"}