- Home
- CVEs with nessus.description==From+Red+Hat+Security+Advisory+2011%3A1241+%3A%0A%0AUpdated+ecryptfs-utils+packages+that+fix+several+security+issues+are+now+available+for+Red+Hat+Enterprise+Linux+5+and+6.%0A%0AThe+Red+Hat+Security+Response+Team+has+rated+this+update+as+having+moderate+security+impact.+Common+Vulnerability+Scoring+System+%28CVSS%29+base+scores%2C+which+give+detailed+severity+ratings%2C+are+available+for+each+vulnerability+from+the+CVE+links+in+the+References+section.%0A%0AeCryptfs+is+a+stacked%2C+cryptographic+file+system.+It+is+transparent+to+the+underlying+file+system+and+provides+per-file+granularity.+eCryptfs+is+released+as+a+Technology+Preview+for+Red+Hat+Enterprise+Linux+5+and+6.%0A%0AThe+setuid+mount.ecryptfs_private+utility+allows+users+to+mount+an+eCryptfs+file+system.+This+utility+can+only+be+run+by+users+in+the+%27ecryptfs%27+group.%0A%0AA+race+condition+flaw+was+found+in+the+way+mount.ecryptfs_private+checked+the+permissions+of+a+requested+mount+point+when+mounting+an+encrypted+file+system.+A+local+attacker+could+possibly+use+this+flaw+to+escalate+their+privileges+by+mounting+over+an+arbitrary+directory.%0A%28CVE-2011-1831%29%0A%0AA+race+condition+flaw+in+umount.ecryptfs_private+could+allow+a+local+attacker+to+unmount+an+arbitrary+file+system.+%28CVE-2011-1832%29%0A%0AIt+was+found+that+mount.ecryptfs_private+did+not+handle+certain+errors+correctly+when+updating+the+mtab+%28mounted+file+systems+table%29+file%2C+allowing+a+local+attacker+to+corrupt+the+mtab+file+and+possibly+unmount+an+arbitrary+file+system.+%28CVE-2011-1834%29%0A%0AAn+insecure+temporary+file+use+flaw+was+found+in+the+ecryptfs-setup-private+script.+A+local+attacker+could+use+this+script+to+insert+their+own+key+that+will+subsequently+be+used+by+a+new+user%2C+possibly+giving+the+attacker+access+to+the+user%27s+encrypted+data+if+existing+file+permissions+allow+access.+%28CVE-2011-1835%29%0A%0AA+race+condition+flaw+in+mount.ecryptfs_private+could+allow+a+local+attacker+to+overwrite+arbitrary+files.+%28CVE-2011-1837%29%0A%0AA+race+condition+flaw+in+the+way+temporary+files+were+accessed+in+mount.ecryptfs_private+could+allow+a+malicious%2C+local+user+to+make+arbitrary+modifications+to+the+mtab+file.+%28CVE-2011-3145%29%0A%0AA+race+condition+flaw+was+found+in+the+way+mount.ecryptfs_private+checked+the+permissions+of+the+directory+to+mount.+A+local+attacker+could+use+this+flaw+to+mount+%28and+then+access%29+a+directory+they+would+otherwise+not+have+access+to.+Note%3A+The+fix+for+this+issue+is+incomplete+until+a+kernel-space+change+is+made.+Future+Red+Hat+Enterprise+Linux+5+and+6+kernel+updates+will+correct+this+issue.%0A%28CVE-2011-1833%29%0A%0ARed+Hat+would+like+to+thank+the+Ubuntu+Security+Team+for+reporting+these+issues.+The+Ubuntu+Security+Team+acknowledges+Vasiliy+Kulikov+of+Openwall+and+Dan+Rosenberg+as+the+original+reporters+of+CVE-2011-1831%2C+CVE-2011-1832%2C+and+CVE-2011-1833%3B+Dan+Rosenberg+and+Marc+Deslauriers+as+the+original+reporters+of+CVE-2011-1834%3B+Marc+Deslauriers+as+the+original+reporter+of+CVE-2011-1835%3B+and+Vasiliy+Kulikov+of+Openwall+as+the+original+reporter+of+CVE-2011-1837.%0A%0AUsers+of+ecryptfs-utils+are+advised+to+upgrade+to+these+updated+packages%2C+which+contain+backported+patches+to+correct+these+issues
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top