[ubuntu/oneiric] ecryptfs-utils 89-0ubuntu2 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Tue Aug 9 17:30:22 UTC 2011


ecryptfs-utils (89-0ubuntu2) oneiric; urgency=low

  * SECURITY UPDATE: privilege escalation via mountpoint race conditions
    (LP: #732628)
    - debian/patches/CVE-2011-1831,1832,1834.patch: chdir into mountpoint
      before checking permissions in src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1831
    - CVE-2011-1832
  * SECURITY UPDATE: race condition when checking source during mount
    (LP: #732628)
    - debian/patches/CVE-2011-1833.patch: use new ecryptfs_check_dev_ruid
      kernel option when mounting directory in
      src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1833
  * SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
    - debian/patches/CVE-2011-1831,1832,1834.patch: modify mtab via a temp
      file first and make sure it succeeds before replacing the real mtab
      in src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1834
  * SECURITY UPDATE: key poisoning via insecure temp directory handling
    (LP: #732628)
    - debian/patches/CVE-2011-1835.patch: make sure we don't copy into a
      user controlled directory in src/utils/ecryptfs-setup-private.
    - CVE-2011-1835
  * SECURITY UPDATE: information disclosure via recovery mount in /tmp
    (LP: #732628)
    - debian/patches/CVE-2011-1836.patch: mount inside protected
      subdirectory in src/utils/ecryptfs-recover-private.
    - CVE-2011-1836
  * SECURITY UPDATE: arbitrary file overwrite via lock counter race
    condition (LP: #732628)
    - debian/patches/CVE-2011-1837.patch: verify permissions with a file
      descriptor, and don't follow symlinks in
      src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1837

Date: Thu, 04 Aug 2011 10:37:40 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/oneiric/+source/ecryptfs-utils/89-0ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 04 Aug 2011 10:37:40 -0400
Source: ecryptfs-utils
Binary: ecryptfs-utils libecryptfs0 libecryptfs-dev
Architecture: source
Version: 89-0ubuntu2
Distribution: oneiric
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 ecryptfs-utils - ecryptfs cryptographic filesystem (utilities)
 libecryptfs-dev - ecryptfs cryptographic filesystem (development)
 libecryptfs0 - ecryptfs cryptographic filesystem (library)
Launchpad-Bugs-Fixed: 732628
Changes: 
 ecryptfs-utils (89-0ubuntu2) oneiric; urgency=low
 .
   * SECURITY UPDATE: privilege escalation via mountpoint race conditions
     (LP: #732628)
     - debian/patches/CVE-2011-1831,1832,1834.patch: chdir into mountpoint
       before checking permissions in src/utils/mount.ecryptfs_private.c.
     - CVE-2011-1831
     - CVE-2011-1832
   * SECURITY UPDATE: race condition when checking source during mount
     (LP: #732628)
     - debian/patches/CVE-2011-1833.patch: use new ecryptfs_check_dev_ruid
       kernel option when mounting directory in
       src/utils/mount.ecryptfs_private.c.
     - CVE-2011-1833
   * SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
     - debian/patches/CVE-2011-1831,1832,1834.patch: modify mtab via a temp
       file first and make sure it succeeds before replacing the real mtab
       in src/utils/mount.ecryptfs_private.c.
     - CVE-2011-1834
   * SECURITY UPDATE: key poisoning via insecure temp directory handling
     (LP: #732628)
     - debian/patches/CVE-2011-1835.patch: make sure we don't copy into a
       user controlled directory in src/utils/ecryptfs-setup-private.
     - CVE-2011-1835
   * SECURITY UPDATE: information disclosure via recovery mount in /tmp
     (LP: #732628)
     - debian/patches/CVE-2011-1836.patch: mount inside protected
       subdirectory in src/utils/ecryptfs-recover-private.
     - CVE-2011-1836
   * SECURITY UPDATE: arbitrary file overwrite via lock counter race
     condition (LP: #732628)
     - debian/patches/CVE-2011-1837.patch: verify permissions with a file
       descriptor, and don't follow symlinks in
       src/utils/mount.ecryptfs_private.c.
     - CVE-2011-1837
Checksums-Sha1: 
 93e952a51ca7bc7eea81ef1f3db5a224f1d6a8e1 2120 ecryptfs-utils_89-0ubuntu2.dsc
 c12b9b69cb34c9098242195074f8a3f4a5c34cf8 21703 ecryptfs-utils_89-0ubuntu2.debian.tar.gz
Checksums-Sha256: 
 6b462a2f88fdd7fad24b4e5136afd7b3fd094fb342faacd4c7d443fd25adddbc 2120 ecryptfs-utils_89-0ubuntu2.dsc
 b065ab5834ef5b78476915ba3232cd4966fe18cad6c903cf9d1a9470c8d54c03 21703 ecryptfs-utils_89-0ubuntu2.debian.tar.gz
Files: 
 2607abfd6b33aa99bece107ee28788c5 2120 misc optional ecryptfs-utils_89-0ubuntu2.dsc
 b2fc72deac81b7ed9a3714f4b7c7d852 21703 misc optional ecryptfs-utils_89-0ubuntu2.debian.tar.gz
Original-Maintainer: Daniel Baumann <daniel at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=isKK
-----END PGP SIGNATURE-----


More information about the Oneiric-changes mailing list