Debian: DSA-2382-1: ecryptfs-utils security update

    Date07 Jan 2012
    CategoryDebian
    51
    Posted ByLinuxSecurity Advisories
    Several problems have been discovered in ecryptfs-utils, a cryptographic filesystem for Linux. CVE-2011-1831
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2382-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                        Jonathan Wiltshire
    January 07, 2012                       http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : ecryptfs-utils
    Vulnerability  : multiple
    Problem type   : local
    Debian-specific: no
    CVE ID         : CVE-2011-1831 CVE-2011-1832 CVE-2011-1834 CVE-2011-1835 
                     CVE-2011-1837 CVE-2011-3145 
    
    Several problems have been discovered in ecryptfs-utils, a cryptographic
    filesystem for Linux.
    
    CVE-2011-1831
    
      Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs
      incorrectly validated permissions on the requested mountpoint. A local
      attacker could use this flaw to mount to arbitrary locations, leading
      to privilege escalation.
    
    CVE-2011-1832
    
      Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs
      incorrectly validated permissions on the requested mountpoint. A local
      attacker could use this flaw to unmount to arbitrary locations, leading
      to a denial of service.
    
    CVE-2011-1834
    
      Dan Rosenberg and Marc Deslauriers discovered that eCryptfs incorrectly
      handled modifications to the mtab file when an error occurs. A local
      attacker could use this flaw to corrupt the mtab file, and possibly
      unmount arbitrary locations, leading to a denial of service.
    
    CVE-2011-1835
    
      Marc Deslauriers discovered that eCryptfs incorrectly handled keys when
      setting up an encrypted private directory. A local attacker could use
      this flaw to manipulate keys during creation of a new user.
    
    CVE-2011-1837
    
      Vasiliy Kulikov of Openwall discovered that eCryptfs incorrectly handled
      lock counters. A local attacker could use this flaw to possibly overwrite
      arbitrary files.
    
    We acknowledge the work of the Ubuntu distribution in preparing patches
    suitable for near-direct inclusion in the Debian package.
    
    For the oldstable distribution (lenny), these problems have been fixed in
    version 68-1+lenny1.
    
    For the stable distribution (squeeze), these problems have been fixed in
    version 83-4+squeeze1.
    
    For the testing distribution (wheezy) and the unstable distribution (sid),
    these problems have been fixed in version 95-1.
    
    We recommend that you upgrade your ecryptfs-utils packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.