CWE
362
Advisory Published

RHSA-2011:1241: Moderate: ecryptfs-utils security update

First published: Wed Aug 31 2011(Updated: )

eCryptfs is a stacked, cryptographic file system. It is transparent to the<br>underlying file system and provides per-file granularity. eCryptfs is<br>released as a Technology Preview for Red Hat Enterprise Linux 5 and 6.<br>The setuid mount.ecryptfs_private utility allows users to mount an eCryptfs<br>file system. This utility can only be run by users in the "ecryptfs" group.<br>A race condition flaw was found in the way mount.ecryptfs_private checked<br>the permissions of a requested mount point when mounting an encrypted file<br>system. A local attacker could possibly use this flaw to escalate their<br>privileges by mounting over an arbitrary directory. (CVE-2011-1831)<br>A race condition flaw in umount.ecryptfs_private could allow a local<br>attacker to unmount an arbitrary file system. (CVE-2011-1832)<br>It was found that mount.ecryptfs_private did not handle certain errors<br>correctly when updating the mtab (mounted file systems table) file,<br>allowing a local attacker to corrupt the mtab file and possibly unmount an<br>arbitrary file system. (CVE-2011-1834)<br>An insecure temporary file use flaw was found in the ecryptfs-setup-private<br>script. A local attacker could use this script to insert their own key that<br>will subsequently be used by a new user, possibly giving the attacker<br>access to the user's encrypted data if existing file permissions allow<br>access. (CVE-2011-1835)<br>A race condition flaw in mount.ecryptfs_private could allow a local<br>attacker to overwrite arbitrary files. (CVE-2011-1837)<br>A race condition flaw in the way temporary files were accessed in<br>mount.ecryptfs_private could allow a malicious, local user to make<br>arbitrary modifications to the mtab file. (CVE-2011-3145)<br>A race condition flaw was found in the way mount.ecryptfs_private checked<br>the permissions of the directory to mount. A local attacker could use this<br>flaw to mount (and then access) a directory they would otherwise not have<br>access to. Note: The fix for this issue is incomplete until a kernel-space<br>change is made. Future Red Hat Enterprise Linux 5 and 6 kernel updates<br>will correct this issue. (CVE-2011-1833)<br>Red Hat would like to thank the Ubuntu Security Team for reporting these<br>issues. The Ubuntu Security Team acknowledges Vasiliy Kulikov of Openwall<br>and Dan Rosenberg as the original reporters of CVE-2011-1831,<br>CVE-2011-1832, and CVE-2011-1833; Dan Rosenberg and Marc Deslauriers as the<br>original reporters of CVE-2011-1834; Marc Deslauriers as the original<br>reporter of CVE-2011-1835; and Vasiliy Kulikov of Openwall as the original<br>reporter of CVE-2011-1837.<br>Users of ecryptfs-utils are advised to upgrade to these updated packages,<br>which contain backported patches to correct these issues.<br>

Affected SoftwareAffected VersionHow to fix
redhat/ecryptfs-utils<82-6.el6_1.3
82-6.el6_1.3
redhat/ecryptfs-utils<82-6.el6_1.3
82-6.el6_1.3
redhat/ecryptfs-utils-debuginfo<82-6.el6_1.3
82-6.el6_1.3
redhat/ecryptfs-utils-debuginfo<82-6.el6_1.3
82-6.el6_1.3
redhat/ecryptfs-utils-devel<82-6.el6_1.3
82-6.el6_1.3
redhat/ecryptfs-utils-devel<82-6.el6_1.3
82-6.el6_1.3
redhat/ecryptfs-utils-python<82-6.el6_1.3
82-6.el6_1.3
redhat/ecryptfs-utils-python<82-6.el6_1.3
82-6.el6_1.3
redhat/ecryptfs-utils<75-5.el5_7.2
75-5.el5_7.2
redhat/ecryptfs-utils<75-5.el5_7.2
75-5.el5_7.2
redhat/ecryptfs-utils-devel<75-5.el5_7.2
75-5.el5_7.2
redhat/ecryptfs-utils-devel<75-5.el5_7.2
75-5.el5_7.2
redhat/ecryptfs-utils-gui<75-5.el5_7.2
75-5.el5_7.2
redhat/ecryptfs-utils-gui<75-5.el5_7.2
75-5.el5_7.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203