[ubuntu/natty-security] ecryptfs-utils, ecryptfs-utils_87-0ubuntu1.1_armel_translations.tar.gz, ecryptfs-utils_87-0ubuntu1.1_powerpc_translations.tar.gz, ecryptfs-utils_87-0ubuntu1.1_i386_translations.tar.gz, ecryptfs-utils_87-0ubuntu1.1_amd64_translations.tar.gz 87-0ubuntu1.1 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Tue Aug 9 17:03:23 UTC 2011


ecryptfs-utils (87-0ubuntu1.1) natty-security; urgency=low

  * SECURITY UPDATE: privilege escalation via mountpoint race conditions
    (LP: #732628)
    - debian/patches/CVE-2011-1831,1832,1834.patch: chdir into mountpoint
      before checking permissions in src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1831
    - CVE-2011-1832
  * SECURITY UPDATE: race condition when checking source during mount
    (LP: #732628)
    - debian/patches/CVE-2011-1833.patch: use new ecryptfs_check_dev_ruid
      kernel option when mounting directory in
      src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1833
  * SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
    - debian/patches/CVE-2011-1831,1832,1834.patch: modify mtab via a temp
      file first and make sure it succeeds before replacing the real mtab
      in src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1834
  * SECURITY UPDATE: key poisoning via insecure temp directory handling
    (LP: #732628)
    - debian/patches/CVE-2011-1835.patch: make sure we don't copy into a
      user controlled directory in src/utils/ecryptfs-setup-private.
    - CVE-2011-1835
  * SECURITY UPDATE: information disclosure via recovery mount in /tmp
    (LP: #732628)
    - debian/patches/CVE-2011-1836.patch: mount inside protected
      subdirectory in src/utils/ecryptfs-recover-private.
    - CVE-2011-1836
  * SECURITY UPDATE: arbitrary file overwrite via lock counter race
    condition (LP: #732628)
    - debian/patches/CVE-2011-1837.patch: verify permissions with a file
      descriptor, and don't follow symlinks in
      src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1837

Date: Thu, 04 Aug 2011 10:43:33 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/natty/+source/ecryptfs-utils/87-0ubuntu1.1
-------------- next part --------------
Format: 1.8
Date: Thu, 04 Aug 2011 10:43:33 -0400
Source: ecryptfs-utils
Binary: ecryptfs-utils libecryptfs0 libecryptfs-dev
Architecture: source
Version: 87-0ubuntu1.1
Distribution: natty-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 ecryptfs-utils - ecryptfs cryptographic filesystem (utilities)
 libecryptfs-dev - ecryptfs cryptographic filesystem (development)
 libecryptfs0 - ecryptfs cryptographic filesystem (library)
Launchpad-Bugs-Fixed: 732628
Changes: 
 ecryptfs-utils (87-0ubuntu1.1) natty-security; urgency=low
 .
   * SECURITY UPDATE: privilege escalation via mountpoint race conditions
     (LP: #732628)
     - debian/patches/CVE-2011-1831,1832,1834.patch: chdir into mountpoint
       before checking permissions in src/utils/mount.ecryptfs_private.c.
     - CVE-2011-1831
     - CVE-2011-1832
   * SECURITY UPDATE: race condition when checking source during mount
     (LP: #732628)
     - debian/patches/CVE-2011-1833.patch: use new ecryptfs_check_dev_ruid
       kernel option when mounting directory in
       src/utils/mount.ecryptfs_private.c.
     - CVE-2011-1833
   * SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
     - debian/patches/CVE-2011-1831,1832,1834.patch: modify mtab via a temp
       file first and make sure it succeeds before replacing the real mtab
       in src/utils/mount.ecryptfs_private.c.
     - CVE-2011-1834
   * SECURITY UPDATE: key poisoning via insecure temp directory handling
     (LP: #732628)
     - debian/patches/CVE-2011-1835.patch: make sure we don't copy into a
       user controlled directory in src/utils/ecryptfs-setup-private.
     - CVE-2011-1835
   * SECURITY UPDATE: information disclosure via recovery mount in /tmp
     (LP: #732628)
     - debian/patches/CVE-2011-1836.patch: mount inside protected
       subdirectory in src/utils/ecryptfs-recover-private.
     - CVE-2011-1836
   * SECURITY UPDATE: arbitrary file overwrite via lock counter race
     condition (LP: #732628)
     - debian/patches/CVE-2011-1837.patch: verify permissions with a file
       descriptor, and don't follow symlinks in
       src/utils/mount.ecryptfs_private.c.
     - CVE-2011-1837
Checksums-Sha1: 
 d6f9666b73d1c80186b1cf0ff566e613177054ac 2130 ecryptfs-utils_87-0ubuntu1.1.dsc
 601404fc61cbfa65aeb10ce7db43ad81b7882f53 21120 ecryptfs-utils_87-0ubuntu1.1.debian.tar.gz
Checksums-Sha256: 
 e904066d62be5e75e021bc3c478619a23b7773f24dcfca040ea873aa8f8f056f 2130 ecryptfs-utils_87-0ubuntu1.1.dsc
 649bfb032082bd3ffaaa6970f55241d3eff1982f5f1261b91cd0a4f8e887e6e8 21120 ecryptfs-utils_87-0ubuntu1.1.debian.tar.gz
Files: 
 1fc12fbace9f2c8c50aa2c1e95e055cf 2130 misc optional ecryptfs-utils_87-0ubuntu1.1.dsc
 09f3beb962bbebb42bc2694f058f4b9f 21120 misc optional ecryptfs-utils_87-0ubuntu1.1.debian.tar.gz
Original-Maintainer: Daniel Baumann <daniel at debian.org>


More information about the Natty-changes mailing list