SCIENTIFIC-LINUX-ERRATA Archives

September 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Thu, 1 Sep 2011 11:31:30 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (81 lines)
Synopsis:    Moderate: ecryptfs-utils security update
Issue Date:  2011-08-31
CVE Numbers: CVE-2011-1831
              CVE-2011-3145


eCryptfs is a stacked, cryptographic file system. It is transparent to 
the underlying file system and provides per-file granularity.

The setuid mount.ecryptfs_private utility allows users to mount an 
eCryptfs file system. This utility can only be run by users in the 
"ecryptfs" group.

A race condition flaw was found in the way mount.ecryptfs_private 
checked the permissions of a requested mount point when mounting an 
encrypted file system. A local attacker could possibly use this flaw to 
escalate their privileges by mounting over an arbitrary directory. 
(CVE-2011-1831)

A race condition flaw in umount.ecryptfs_private could allow a local
attacker to unmount an arbitrary file system. (CVE-2011-1832)

It was found that mount.ecryptfs_private did not handle certain errors
correctly when updating the mtab (mounted file systems table) file,
allowing a local attacker to corrupt the mtab file and possibly unmount 
an arbitrary file system. (CVE-2011-1834)

An insecure temporary file use flaw was found in the 
ecryptfs-setup-private script. A local attacker could use this script to 
insert their own key that will subsequently be used by a new user, 
possibly giving the attacker access to the user's encrypted data if 
existing file permissions allow access. (CVE-2011-1835)

A race condition flaw in mount.ecryptfs_private could allow a local
attacker to overwrite arbitrary files. (CVE-2011-1837)

A race condition flaw in the way temporary files were accessed in
mount.ecryptfs_private could allow a malicious, local user to make
arbitrary modifications to the mtab file. (CVE-2011-3145)

A race condition flaw was found in the way mount.ecryptfs_private 
checked the permissions of the directory to mount. A local attacker 
could use this flaw to mount (and then access) a directory they would 
otherwise not have access to. Note: The fix for this issue is incomplete 
until a kernel-space change is made. Future Scientific Linux 5 and 6 
kernel updates will correct this issue. (CVE-2011-1833)

Users of ecryptfs-utils are advised to upgrade to these updated 
packages, which contain backported patches to correct these issues.

SL5:
   i386
      ecryptfs-utils-75-5.el5_7.2.i386.rpm
      ecryptfs-utils-debuginfo-75-5.el5_7.2.i386.rpm
      ecryptfs-utils-devel-75-5.el5_7.2.i386.rpm
      ecryptfs-utils-gui-75-5.el5_7.2.i386.rpm
   x86_64
      ecryptfs-utils-devel-75-5.el5_7.2.x86_64.rpm
      ecryptfs-utils-debuginfo-75-5.el5_7.2.x86_64.rpm
      ecryptfs-utils-debuginfo-75-5.el5_7.2.i386.rpm
      ecryptfs-utils-gui-75-5.el5_7.2.x86_64.rpm
      ecryptfs-utils-75-5.el5_7.2.x86_64.rpm
      ecryptfs-utils-75-5.el5_7.2.i386.rpm
      ecryptfs-utils-devel-75-5.el5_7.2.i386.rpm
SL6:
   i386
      ecryptfs-utils-python-82-6.el6_1.3.i686.rpm
      ecryptfs-utils-devel-82-6.el6_1.3.i686.rpm
      ecryptfs-utils-debuginfo-82-6.el6_1.3.i686.rpm
      ecryptfs-utils-82-6.el6_1.3.i686.rpm
   x86_64
      ecryptfs-utils-devel-82-6.el6_1.3.x86_64.rpm
      ecryptfs-utils-devel-82-6.el6_1.3.i686.rpm
      ecryptfs-utils-debuginfo-82-6.el6_1.3.x86_64.rpm
      ecryptfs-utils-debuginfo-82-6.el6_1.3.i686.rpm
      ecryptfs-utils-82-6.el6_1.3.x86_64.rpm
      ecryptfs-utils-82-6.el6_1.3.i686.rpm
      ecryptfs-utils-python-82-6.el6_1.3.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2