First published: Tue Aug 09 2011(Updated: )
Last updated 24 July 2024
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ecryptfs-utils | <0:75-5.el5_7.2 | 0:75-5.el5_7.2 |
redhat/ecryptfs-utils | <0:82-6.el6_1.3 | 0:82-6.el6_1.3 |
debian/ecryptfs-utils | 111-5 111-6 111-7 | |
eCryptfs-utils | <=89 | |
eCryptfs-utils | =62 | |
eCryptfs-utils | =63 | |
eCryptfs-utils | =64 | |
eCryptfs-utils | =65 | |
eCryptfs-utils | =66 | |
eCryptfs-utils | =67 | |
eCryptfs-utils | =68 | |
eCryptfs-utils | =69 | |
eCryptfs-utils | =70 | |
eCryptfs-utils | =71 | |
eCryptfs-utils | =72 | |
eCryptfs-utils | =73 | |
eCryptfs-utils | =74 | |
eCryptfs-utils | =75 | |
eCryptfs-utils | =76 | |
eCryptfs-utils | =77 | |
eCryptfs-utils | =78 | |
eCryptfs-utils | =79 | |
eCryptfs-utils | =80 | |
eCryptfs-utils | =81 | |
eCryptfs-utils | =82 | |
eCryptfs-utils | =83 | |
eCryptfs-utils | =84 | |
eCryptfs-utils | =85 | |
eCryptfs-utils | =86 | |
eCryptfs-utils | =87 | |
eCryptfs-utils | =58 | |
eCryptfs-utils | =59 | |
eCryptfs-utils | =60 | |
eCryptfs-utils | =61 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1832 is considered to have a medium severity level, as it allows local users to remove directories, which may lead to potential data loss or system instability.
To fix CVE-2011-1832, upgrade ecryptfs-utils to version 0:75-5.el5_7.2 or later for Red Hat, and to versions 111-5, 111-6, or 111-7 for Debian.
CVE-2011-1832 affects local users of systems running vulnerable versions of ecryptfs-utils, particularly between versions earlier than 90.
The impacts of CVE-2011-1832 include unauthorized removal of directories by local users, which could disrupt services and lead to data loss.
As a temporary workaround for CVE-2011-1832, administrators can restrict access to the mount points until the software is updated to a secure version.