First published: Tue Aug 09 2011(Updated: )
A number of flaws were reported [1] in eCryptfs that could allow a user to mount or unmount arbitrary locations, and possibly disclose confidential information: Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs incorrectly validated permissions on the requested mountpoint. A local attacker could use this flaw to mount to arbitrary locations, leading to privilege escalation. (<a href="https://access.redhat.com/security/cve/CVE-2011-1831">CVE-2011-1831</a>) Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs incorrectly validated permissions on the requested mountpoint. A local attacker could use this flaw to unmount to arbitrary locations, leading to a denial of service. (<a href="https://access.redhat.com/security/cve/CVE-2011-1832">CVE-2011-1832</a>) Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs incorrectly validated permissions on the requested source directory. A local attacker could use this flaw to mount an arbitrary directory, possibly leading to information disclosure. Note that this flaw also requires a fix in the kernel to be complete. (<a href="https://access.redhat.com/security/cve/CVE-2011-1833">CVE-2011-1833</a>) Dan Rosenberg and Marc Deslauriers discovered that eCryptfs incorrectly handled modifications to the mtab file when an error occurs. A local attacker could use this flaw to corrupt the mtab file, and possibly unmount arbitrary locations, leading to a denial of service. (<a href="https://access.redhat.com/security/cve/CVE-2011-1834">CVE-2011-1834</a>) Marc Deslauriers discovered that eCryptfs incorrectly handled keys when setting up an encrypted private directory. A local attacker could use this flaw to manipulate keys during creation of a new user. (<a href="https://access.redhat.com/security/cve/CVE-2011-1835">CVE-2011-1835</a>) Marc Deslauriers discovered that eCryptfs incorrectly handled permissions during recovery. A local attacker could use this flaw to possibly access another user's data during the recovery process. (<a href="https://access.redhat.com/security/cve/CVE-2011-1836">CVE-2011-1836</a>) Vasiliy Kulikov of Openwall discovered that eCryptfs incorrectly handled lock counters. A local attacker could use this flaw to possibly overwrite arbitrary files. (<a href="https://access.redhat.com/security/cve/CVE-2011-1837">CVE-2011-1837</a>) [1] <a href="https://launchpad.net/bugs/732628">https://launchpad.net/bugs/732628</a>
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ecryptfs Ecryptfs-utils | =68 | |
Ecryptfs Ecryptfs-utils | =62 | |
Ecryptfs Ecryptfs-utils | =74 | |
Ecryptfs Ecryptfs-utils | =87 | |
Ecryptfs Ecryptfs-utils | =82 | |
Ecryptfs Ecryptfs-utils | =86 | |
Ecryptfs Ecryptfs-utils | =80 | |
Ecryptfs Ecryptfs-utils | =65 | |
Ecryptfs Ecryptfs-utils | =79 | |
Ecryptfs Ecryptfs-utils | =83 | |
Ecryptfs Ecryptfs-utils | =72 | |
Ecryptfs Ecryptfs-utils | =69 | |
Ecryptfs Ecryptfs-utils | =63 | |
Ecryptfs Ecryptfs-utils | =64 | |
Ecryptfs Ecryptfs Utils | =60 | |
Ecryptfs Ecryptfs Utils | =58 | |
Ecryptfs Ecryptfs-utils | =70 | |
Ecryptfs Ecryptfs-utils | =77 | |
Ecryptfs Ecryptfs Utils | =61 | |
Ecryptfs Ecryptfs-utils | =76 | |
Ecryptfs Ecryptfs-utils | =75 | |
Ecryptfs Ecryptfs-utils | =71 | |
Ecryptfs Ecryptfs-utils | =85 | |
Ecryptfs Ecryptfs-utils | =78 | |
Ecryptfs Ecryptfs-utils | <=89 | |
Ecryptfs Ecryptfs-utils | =84 | |
Ecryptfs Ecryptfs-utils | =67 | |
Ecryptfs Ecryptfs-utils | =81 | |
Ecryptfs Ecryptfs-utils | =73 | |
Ecryptfs Ecryptfs-utils | =66 | |
Ecryptfs Ecryptfs Utils | =59 | |
debian/ecryptfs-utils | 111-5 111-6 111-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.