* SECURITY UPDATE: privilege escalation via mountpoint race conditions
(LP: #732628)
- src/utils/mount.ecryptfs_private.c: chdir into mountpoint before
checking permissions. Patch thanks to Dan Rosenberg.
- CVE-2011-1831
- CVE-2011-1832
* SECURITY UPDATE: race condition when checking source during mount
(LP: #732628)
- src/utils/mount.ecryptfs_private.c: use new ecryptfs_check_dev_ruid
kernel option when mounting directory.
- CVE-2011-1833
* SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
- src/utils/mount.ecryptfs_private.c: modify mtab via a temp file first
and make sure it succeeds before replacing the real mtab. Patch
thanks to Dan Rosenberg.
- CVE-2011-1834
* SECURITY UPDATE: key poisoning via insecure temp directory handling
(LP: #732628)
- src/utils/ecryptfs-setup-private: make sure we don't copy into a
user controlled directory.
- CVE-2011-1835
* SECURITY UPDATE: arbitrary file overwrite via lock counter race
condition (LP: #732628)
- src/utils/mount.ecryptfs_private.c: verify permissions with a file
descriptor, and don't follow symlinks.
- CVE-2011-1837
-- Marc Deslauriers <email address hidden> Thu, 04 Aug 2011 10:41:53 -0400
This bug was fixed in the package ecryptfs-utils - 83-0ubuntu3. 2.10.10. 1
--------------- 2.10.10. 1) maverick-security; urgency=low
ecryptfs-utils (83-0ubuntu3.
* SECURITY UPDATE: privilege escalation via mountpoint race conditions mount.ecryptfs_ private. c: chdir into mountpoint before mount.ecryptfs_ private. c: use new ecryptfs_ check_dev_ ruid mount.ecryptfs_ private. c: modify mtab via a temp file first ecryptfs- setup-private: make sure we don't copy into a mount.ecryptfs_ private. c: verify permissions with a file
(LP: #732628)
- src/utils/
checking permissions. Patch thanks to Dan Rosenberg.
- CVE-2011-1831
- CVE-2011-1832
* SECURITY UPDATE: race condition when checking source during mount
(LP: #732628)
- src/utils/
kernel option when mounting directory.
- CVE-2011-1833
* SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
- src/utils/
and make sure it succeeds before replacing the real mtab. Patch
thanks to Dan Rosenberg.
- CVE-2011-1834
* SECURITY UPDATE: key poisoning via insecure temp directory handling
(LP: #732628)
- src/utils/
user controlled directory.
- CVE-2011-1835
* SECURITY UPDATE: arbitrary file overwrite via lock counter race
condition (LP: #732628)
- src/utils/
descriptor, and don't follow symlinks.
- CVE-2011-1837
-- Marc Deslauriers <email address hidden> Thu, 04 Aug 2011 10:41:53 -0400