Kod programskog paketa ecryptfs-utils uočeni su i ispravljeni višestruki sigurnosni nedostaci. Riječ je o ranjivostima koje potencijalnim napadačima omogućuju otkrivanje osjetljivih informacija i povećanje sigurnosnih ovlasti.
Paket:
ecryptfs-utils
Operacijski sustavi:
Fedora 14, Fedora 15
Kritičnost:
4.6
Problem:
neodgovarajuće rukovanje memorijom, pogreška u programskoj funkciji, pogreška u programskoj komponenti
Iskorištavanje:
lokalno
Posljedica:
dobivanje većih privilegija, otkrivanje osjetljivih informacija
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-10718
2011-08-12 10:34:39
--------------------------------------------------------------------------------
Name : ecryptfs-utils
Product : Fedora 14
Version : 90
Release : 1.fc14
URL : https://launchpad.net/ecryptfs
Summary : The eCryptfs mount helper and support libraries
Description :
eCryptfs is a stacked cryptographic filesystem that ships in Linux
kernel versions 2.6.19 and above. This package provides the mount
helper and supporting libraries to perform key management and mount
functions.
Install ecryptfs-utils if you would like to mount eCryptfs.
--------------------------------------------------------------------------------
Update Information:
- privilege escalation via mountpoint race conditions (CVE-2011-1831,
CVE-2011-1832)
- race condition when checking source during mount (CVE-2011-1833)
- mtab corruption via improper handling (CVE-2011-1834)
- key poisoning via insecure temp directory handling (CVE-2011-1835)
- information disclosure via recovery mount in /tmp (CVE-2011-1836)
- arbitrary file overwrite via lock counter race (CVE-2011-1837)
- improve logging messages of ecryptfs pam module
- keep own copy of passphrase, pam clears it too early
- keyring from auth stack does not survive, use pam_data and delayed keyring
initialization
- keyring from auth stack does not survive, use pam_data and delayed keyring
initialization
- keyring from auth stack does not survive, use pam_data and delayed keyring
initialization
- improve logging messages of ecryptfs pam module
- keep own copy of passphrase, pam clears it too early
- keyring from auth stack does not survive, use pam_data and delayed keyring
initialization
- keyring from auth stack does not survive, use pam_data and delayed keyring
initialization
- keyring from auth stack does not survive, use pam_data and delayed keyring
initialization
- improve logging messages of ecryptfs pam module
- keep own copy of passphrase, pam clears it too early
- keyring from auth stack does not survive, use pam_data and delayed keyring
initialization
- keyring from auth stack does not survive, use pam_data and delayed keyring
initialization
- keyring from auth stack does not survive, use pam_data and delayed keyring
initialization
--------------------------------------------------------------------------------
ChangeLog:
* Thu Aug 11 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 90-1
- security fixes:
- privilege escalation via mountpoint race conditions (CVE-2011-1831,
CVE-2011-1832)
- race condition when checking source during mount (CVE-2011-1833)
- mtab corruption via improper handling (CVE-2011-1834)
- key poisoning via insecure temp directory handling (CVE-2011-1835)
- information disclosure via recovery mount in /tmp (CVE-2011-1836)
- arbitrary file overwrite via lock counter race (CVE-2011-1837)
* Tue Aug 9 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 87-8
- improve logging messages of ecryptfs pam module
- keep own copy of passphrase, pam clears it too early
* Wed Aug 3 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 87-7
- keyring from auth stack does not survive, use pam_data and delayed
keyring initialization
* Thu Jul 21 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 87-6
- fix pam module to set ecryptfs gid before mount helper execution
- do not use zombie process, it causes lock ups in ssh
* Tue Jul 19 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 87-5
- do not use memcpy for overlaping areas
- fix broken pam module resulting in session with wrong gid
* Thu Jun 9 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 87-4
- check for ecryptfs pam module before home dir migration
* Tue Jun 7 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 87-3
- update of mtab does not work if it's a symlink (#706911)
* Thu May 26 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 87-2
- auto-load ecryptfs module in ecryptfs-setup-private
* Tue May 24 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 87-1
- updated to v. 87
* Wed Mar 2 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 86-2
- fix selinux context
* Fri Feb 25 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 86-1
- updated to v. 86
* Tue Feb 1 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 85-1
- ecryptfs-utils updated to 85
* Tue Jan 11 2011 Dan HorÄ
Posljednje sigurnosne preporuke