First published: Wed Aug 31 2011(Updated: )
eCryptfs is a stacked, cryptographic file system. It is transparent to the<br>underlying file system and provides per-file granularity. eCryptfs is<br>released as a Technology Preview for Red Hat Enterprise Linux 5 and 6.<br>The setuid mount.ecryptfs_private utility allows users to mount an eCryptfs<br>file system. This utility can only be run by users in the "ecryptfs" group.<br>A race condition flaw was found in the way mount.ecryptfs_private checked<br>the permissions of a requested mount point when mounting an encrypted file<br>system. A local attacker could possibly use this flaw to escalate their<br>privileges by mounting over an arbitrary directory. (CVE-2011-1831)<br>A race condition flaw in umount.ecryptfs_private could allow a local<br>attacker to unmount an arbitrary file system. (CVE-2011-1832)<br>It was found that mount.ecryptfs_private did not handle certain errors<br>correctly when updating the mtab (mounted file systems table) file,<br>allowing a local attacker to corrupt the mtab file and possibly unmount an<br>arbitrary file system. (CVE-2011-1834)<br>An insecure temporary file use flaw was found in the ecryptfs-setup-private<br>script. A local attacker could use this script to insert their own key that<br>will subsequently be used by a new user, possibly giving the attacker<br>access to the user's encrypted data if existing file permissions allow<br>access. (CVE-2011-1835)<br>A race condition flaw in mount.ecryptfs_private could allow a local<br>attacker to overwrite arbitrary files. (CVE-2011-1837)<br>A race condition flaw in the way temporary files were accessed in<br>mount.ecryptfs_private could allow a malicious, local user to make<br>arbitrary modifications to the mtab file. (CVE-2011-3145)<br>A race condition flaw was found in the way mount.ecryptfs_private checked<br>the permissions of the directory to mount. A local attacker could use this<br>flaw to mount (and then access) a directory they would otherwise not have<br>access to. Note: The fix for this issue is incomplete until a kernel-space<br>change is made. Future Red Hat Enterprise Linux 5 and 6 kernel updates<br>will correct this issue. (CVE-2011-1833)<br>Red Hat would like to thank the Ubuntu Security Team for reporting these<br>issues. The Ubuntu Security Team acknowledges Vasiliy Kulikov of Openwall<br>and Dan Rosenberg as the original reporters of CVE-2011-1831,<br>CVE-2011-1832, and CVE-2011-1833; Dan Rosenberg and Marc Deslauriers as the<br>original reporters of CVE-2011-1834; Marc Deslauriers as the original<br>reporter of CVE-2011-1835; and Vasiliy Kulikov of Openwall as the original<br>reporter of CVE-2011-1837.<br>Users of ecryptfs-utils are advised to upgrade to these updated packages,<br>which contain backported patches to correct these issues.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ecryptfs-utils | <82-6.el6_1.3 | 82-6.el6_1.3 |
redhat/ecryptfs-utils | <82-6.el6_1.3 | 82-6.el6_1.3 |
redhat/ecryptfs-utils-debuginfo | <82-6.el6_1.3 | 82-6.el6_1.3 |
redhat/ecryptfs-utils-debuginfo | <82-6.el6_1.3 | 82-6.el6_1.3 |
redhat/ecryptfs-utils-devel | <82-6.el6_1.3 | 82-6.el6_1.3 |
redhat/ecryptfs-utils-devel | <82-6.el6_1.3 | 82-6.el6_1.3 |
redhat/ecryptfs-utils-python | <82-6.el6_1.3 | 82-6.el6_1.3 |
redhat/ecryptfs-utils-python | <82-6.el6_1.3 | 82-6.el6_1.3 |
redhat/ecryptfs-utils | <75-5.el5_7.2 | 75-5.el5_7.2 |
redhat/ecryptfs-utils | <75-5.el5_7.2 | 75-5.el5_7.2 |
redhat/ecryptfs-utils-devel | <75-5.el5_7.2 | 75-5.el5_7.2 |
redhat/ecryptfs-utils-devel | <75-5.el5_7.2 | 75-5.el5_7.2 |
redhat/ecryptfs-utils-gui | <75-5.el5_7.2 | 75-5.el5_7.2 |
redhat/ecryptfs-utils-gui | <75-5.el5_7.2 | 75-5.el5_7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.