[ Wesley Wiedenmeier ]
* src/utils/mount.ecryptfs.c: LP: #329264
- remove old hack, that worked around a temporary kernel regression;
ensure that all mount memory is mlocked
[ Sebastian Krahmer ]
* src/pam_ecryptfs/pam_ecryptfs.c: LP: #732614
- drop group privileges in the same places that user privileges are
dropped
- check return status of setresuid() calls and return if they fail
- drop privileges before checking for the existence of
~/.ecryptfs/auto-mount to prevent possible file existence leakage
by a symlink to a path that typically would not be searchable by
the user
- drop privileges before reading salt from the rc file to prevent the
leakage of root's salt and, more importantly, using the incorrect salt
- discovered, independently, by Vasiliy Kulikov and Sebastian Krahmer
* src/pam_ecryptfs/pam_ecryptfs.c: LP: #1020904
- after dropping privileges, clear the environment before executing the
private eCryptfs mount helper
- discovered by Sebastian Krahmer
* src/utils/mount.ecryptfs_private.c: LP: #1020904
- do not allow private eCryptfs mount aliases to contain ".." characters
as a preventative measure against a crafted file path being used as an
alias
- force the MS_NOSUID mount flag to protect against user controlled lower
filesystems, such as an auto mounted USB drive, that may contain a
setuid-root binary
+ CVE-2012-3409
- force the MS_NODEV mount flag
- after dropping privileges, clear the environment before executing umount
- discovered by Sebastian Krahmer
[ Tyler Hicks ]
* src/libecryptfs/key_management.c: LP: #732614
- zero statically declared buffers to prevent the leakage of stack
contents in the case of a short file read
- discovered by Vasiliy Kulikov
* src/libecryptfs/module_mgr.c, src/pam_ecryptfs/pam_ecryptfs.c:
- fix compiler warnings
-- Dustin Kirkland <email address hidden> Fri, 13 Jul 2012 09:52:36 -0500
This bug was fixed in the package ecryptfs-utils - 99-0ubuntu1
---------------
ecryptfs-utils (99-0ubuntu1) quantal; urgency=low
[ Dustin Kirkland ] ecryptfs- utils.postinst: LP: #936093
* debian/
- ensure desktop file is executable
* precise
[ Wesley Wiedenmeier ] mount.ecryptfs. c: LP: #329264
* src/utils/
- remove old hack, that worked around a temporary kernel regression;
ensure that all mount memory is mlocked
[ Sebastian Krahmer ] ecryptfs/ pam_ecryptfs. c: LP: #732614 /.ecryptfs/ auto-mount to prevent possible file existence leakage ecryptfs/ pam_ecryptfs. c: LP: #1020904 mount.ecryptfs_ private. c: LP: #1020904
* src/pam_
- drop group privileges in the same places that user privileges are
dropped
- check return status of setresuid() calls and return if they fail
- drop privileges before checking for the existence of
~
by a symlink to a path that typically would not be searchable by
the user
- drop privileges before reading salt from the rc file to prevent the
leakage of root's salt and, more importantly, using the incorrect salt
- discovered, independently, by Vasiliy Kulikov and Sebastian Krahmer
* src/pam_
- after dropping privileges, clear the environment before executing the
private eCryptfs mount helper
- discovered by Sebastian Krahmer
* src/utils/
- do not allow private eCryptfs mount aliases to contain ".." characters
as a preventative measure against a crafted file path being used as an
alias
- force the MS_NOSUID mount flag to protect against user controlled lower
filesystems, such as an auto mounted USB drive, that may contain a
setuid-root binary
+ CVE-2012-3409
- force the MS_NODEV mount flag
- after dropping privileges, clear the environment before executing umount
- discovered by Sebastian Krahmer
[ Tyler Hicks ] /key_management .c: LP: #732614 /module_ mgr.c, src/pam_ ecryptfs/ pam_ecryptfs. c:
* src/libecryptfs
- zero statically declared buffers to prevent the leakage of stack
contents in the case of a short file read
- discovered by Vasiliy Kulikov
* src/libecryptfs
- fix compiler warnings
-- Dustin Kirkland <email address hidden> Fri, 13 Jul 2012 09:52:36 -0500