ecryptfs team mailing list archive
-
ecryptfs team
-
Mailing list archive
-
Message #01870
[Bug 732628] Re: TOCTOU in mount.ecryptfs_private
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-610.28
---------------
linux-fsl-imx51 (2.6.31-610.28) lucid-proposed; urgency=low
* Release tracking bug
- LP: #837802
[ Upstream Kernel Changes ]
* ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
* perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
* proc: fix oops on invalid /proc/<pid>/maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
linux-fsl-imx51 (2.6.31-610.27) lucid-proposed; urgency=low
* Release tracking bug
- LP: #829160
[ Upstream Kernel Changes ]
* fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
* Fix corrupted OSF partition table parsing
- LP: #796606
- CVE-2011-1163
* can: Add missing socket check in can/bcm release.
- LP: #796502
- CVE-2011-1598
* proc: protect mm start_code/end_code in /proc/pid/stat
- LP: #799906
- CVE-2011-0726
* sctp: Fix a race between ICMP protocol unreachable and connect()
* tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077
- LP: #794034
- CVE-2010-4077
* filter: make sure filters dont read uninitialized memory CVE-2010-4158
- LP: #721282
- CVE-2010-4158
* bio: take care not overflow page count when mapping/copying user data
CVE-2010-4162
- LP: #721441
- CVE-2010-4162
* block: check for proper length of iov entries in blk_rq_map_user_iov()
- LP: #721504
- CVE-2010-4163
* block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
* rds: Integer overflow in RDS cmsg handling, CVE-2010-4175
- LP: #721455
- CVE-2010-4175
* bluetooth: Fix missing NULL check CVE-2010-4242
- LP: #714846
- CVE-2010-4242
* IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649
- LP: #800121
- CVE-2010-4649
* epoll: prevent creating circular epoll structures CVE-2011-1082
- LP: #800758
- CVE-2011-1082
* nfs4: Ensure that ACL pages sent over NFS were not allocated from the
slab (v3) CVE-2011-1090
- LP: #800775
* ldm: corrupted partition table can cause kernel oops CVE-2011-1012
- LP: #801083
- CVE-2011-1012
* netfilter: ipt_CLUSTERIP: fix buffer overflow CVE-2011-2534
- LP: #801473
- CVE-2011-2534
* netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170
- LP: #801480
- CVE-2011-1170
* netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171
- LP: #801482
- CVE-2011-1171
* ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172
- LP: #801483
- CVE-2011-1172
* econet: 4 byte infoleak to the network CVE-2011-1173
- LP: #801484
- CVE-2011-1173
* net: Limit socket I/O iovec total length to INT_MAX.
- LP: #708839
* fs/partitions: Validate map_count in Mac partition tables -
CVE-2011-1010
- LP: #804225
- CVE-2011-1010
* drm: fix unsigned vs signed comparison issue in modeset ctl ioctl,
CVE-2011-1013
- LP: #804229
- CVE-2011-1013
* exec: copy-and-paste the fixes into compat_do_execve() paths -
CVE-2010-4243
- LP: #804234
- CVE-2010-4243
* taskstats: don't allow duplicate entries in listener mode,
CVE-2011-2484
- LP: #806390
- CVE-2011-2484
* dccp: handle invalid feature options length, CVE-2011-1770
- LP: #806375
- CVE-2011-1770
* pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
* dccp: fix oops on Reset after close, CVE-2011-1093
- LP: #814087
- CVE-2011-1093
* net: add limit for socket backlog CVE-2010-4251
- LP: #807462
* tcp: use limited socket backlog CVE-2010-4251
- LP: #807462
* ipv6: udp: Optimise multicast reception
- LP: #807462
* ipv4: udp: Optimise multicast reception
- LP: #807462
* udp: multicast RX should increment SNMP/sk_drops counter in allocation
failures CVE-2010-4251
- LP: #807462
* udp: use limited socket backlog CVE-2010-4251
- LP: #807462
* llc: use limited socket backlog CVE-2010-4251
- LP: #807462
* sctp: use limited socket backlog CVE-2010-4251
- LP: #807462
* tipc: use limited socket backlog CVE-2010-4251
- LP: #807462
* x25: use limited socket backlog CVE-2010-4251
- LP: #807462
* net: backlog functions rename CVE-2010-4251
- LP: #807462
* net: sk_add_backlog() take rmem_alloc into account CVE-2010-4805
- LP: #809318
* Bluetooth: sco: fix information leak to userspace, CVE-2011-1078
- LP: #816542
- CVE-2011-1078
* Bluetooth: bnep: fix buffer overflow, CVE-2011-1079
- LP: #816544
- CVE-2011-1079
* bridge: netfilter: fix information leak, CVE-2011-1080
- LP: #816545
- CVE-2011-1080
* char/tpm: Fix unitialized usage of data buffer, CVE-2011-1160
- LP: #816546
- CVE-2011-1160
* irda: validate peer name and attribute lengths, CVE-2011-1180
- LP: #816547
- CVE-2011-1180
* gro: Reset dev pointer on reuse, CVE-2011-1478
- LP: #816549
- CVE-2011-1478
* gro: reset skb_iif on reuse, CVE-2011-1478
- LP: #816549
- CVE-2011-1478
* rose_loopback_timer sets VC number <= ROSE_DEFAULT_MAXVC, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
* ROSE: prevent heap corruption with bad facilities, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
* rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493
- LP: #816550
- CVE-2011-1493
* Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
- LP: #819569
- CVE-2011-2492
* Add mount option to check uid of device being mounted = expect uid,
CVE-2011-1833
- LP: #732628
- CVE-2011-1833
-- Paolo Pisati <paolo.pisati@xxxxxxxxxxxxx> Wed, 31 Aug 2011 10:26:26 +0200
** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4076
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4077
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4158
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4162
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4163
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4175
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4242
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4243
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4251
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4649
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4805
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0726
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1010
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1012
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1013
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1020
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1078
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1079
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1080
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1082
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1090
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1093
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1160
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1163
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1170
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1171
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1172
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1173
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1180
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1478
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1493
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1577
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1598
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1770
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2484
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2492
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2534
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2699
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2918
--
You received this bug notification because you are a member of eCryptfs,
which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/732628
Title:
TOCTOU in mount.ecryptfs_private
Status in eCryptfs - Enterprise Cryptographic Filesystem:
Fix Released
Status in “ecryptfs-utils” package in Ubuntu:
Fix Released
Status in “linux” package in Ubuntu:
Fix Released
Status in “linux-ec2” package in Ubuntu:
Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
Invalid
Status in “linux-linaro” package in Ubuntu:
New
Status in “linux-lts-backport-maverick” package in Ubuntu:
Invalid
Status in “linux-lts-backport-natty” package in Ubuntu:
Invalid
Status in “linux-mvl-dove” package in Ubuntu:
Invalid
Status in “linux-qcm-msm” package in Ubuntu:
New
Status in “linux-source-2.6.15” package in Ubuntu:
Invalid
Status in “linux-ti-omap” package in Ubuntu:
Invalid
Status in “linux-ti-omap4” package in Ubuntu:
Fix Committed
Status in “ecryptfs-utils” source package in Lucid:
Fix Released
Status in “linux” source package in Lucid:
Fix Committed
Status in “linux-ec2” source package in Lucid:
Fix Committed
Status in “linux-fsl-imx51” source package in Lucid:
Fix Released
Status in “linux-linaro” source package in Lucid:
New
Status in “linux-lts-backport-maverick” source package in Lucid:
Fix Committed
Status in “linux-lts-backport-natty” source package in Lucid:
Fix Committed
Status in “linux-mvl-dove” source package in Lucid:
Fix Committed
Status in “linux-qcm-msm” source package in Lucid:
New
Status in “linux-source-2.6.15” source package in Lucid:
Invalid
Status in “linux-ti-omap” source package in Lucid:
Invalid
Status in “linux-ti-omap4” source package in Lucid:
Invalid
Status in “ecryptfs-utils” source package in Maverick:
Fix Released
Status in “linux” source package in Maverick:
Fix Committed
Status in “linux-ec2” source package in Maverick:
Invalid
Status in “linux-fsl-imx51” source package in Maverick:
Invalid
Status in “linux-linaro” source package in Maverick:
New
Status in “linux-lts-backport-maverick” source package in Maverick:
Invalid
Status in “linux-lts-backport-natty” source package in Maverick:
Invalid
Status in “linux-mvl-dove” source package in Maverick:
Fix Committed
Status in “linux-qcm-msm” source package in Maverick:
New
Status in “linux-source-2.6.15” source package in Maverick:
Invalid
Status in “linux-ti-omap” source package in Maverick:
Invalid
Status in “linux-ti-omap4” source package in Maverick:
Fix Committed
Status in “ecryptfs-utils” source package in Natty:
Fix Released
Status in “linux” source package in Natty:
Fix Committed
Status in “linux-ec2” source package in Natty:
Invalid
Status in “linux-fsl-imx51” source package in Natty:
Invalid
Status in “linux-linaro” source package in Natty:
New
Status in “linux-lts-backport-maverick” source package in Natty:
Invalid
Status in “linux-lts-backport-natty” source package in Natty:
Invalid
Status in “linux-mvl-dove” source package in Natty:
Invalid
Status in “linux-qcm-msm” source package in Natty:
New
Status in “linux-source-2.6.15” source package in Natty:
Invalid
Status in “linux-ti-omap” source package in Natty:
Invalid
Status in “linux-ti-omap4” source package in Natty:
Fix Committed
Status in “ecryptfs-utils” source package in Oneiric:
Fix Released
Status in “linux” source package in Oneiric:
Fix Released
Status in “linux-ec2” source package in Oneiric:
Invalid
Status in “linux-fsl-imx51” source package in Oneiric:
Invalid
Status in “linux-linaro” source package in Oneiric:
New
Status in “linux-lts-backport-maverick” source package in Oneiric:
Invalid
Status in “linux-lts-backport-natty” source package in Oneiric:
Invalid
Status in “linux-mvl-dove” source package in Oneiric:
Invalid
Status in “linux-qcm-msm” source package in Oneiric:
New
Status in “linux-source-2.6.15” source package in Oneiric:
Invalid
Status in “linux-ti-omap” source package in Oneiric:
Invalid
Status in “linux-ti-omap4” source package in Oneiric:
Fix Committed
Status in “ecryptfs-utils” source package in Hardy:
Invalid
Status in “linux” source package in Hardy:
Invalid
Status in “linux-ec2” source package in Hardy:
Invalid
Status in “linux-fsl-imx51” source package in Hardy:
Invalid
Status in “linux-linaro” source package in Hardy:
New
Status in “linux-lts-backport-maverick” source package in Hardy:
Invalid
Status in “linux-lts-backport-natty” source package in Hardy:
Invalid
Status in “linux-mvl-dove” source package in Hardy:
Invalid
Status in “linux-qcm-msm” source package in Hardy:
New
Status in “linux-source-2.6.15” source package in Hardy:
Invalid
Status in “linux-ti-omap” source package in Hardy:
Invalid
Status in “linux-ti-omap4” source package in Hardy:
Invalid
Status in “ecryptfs-utils” package in Debian:
New
Status in “ecryptfs-utils” package in Fedora:
New
Bug description:
check_ownerships() function doesn't work as it should because of a
race condition. Arguments of both mount() and umount() calls can be
changed between the check and the usage. This may lead to arbitrary
mount point umounting or probably to gaining ability to try
passphrases of otherpeople's ecryptfs storages. lock_counter() is also
racy. It (1) tries to check existance and ownership of the file before
open(), (2) neither use stat() instead of lstat() nor O_NOFOLLOW, (3)
is not protected against deletion of the lock file by the owner. The
lock file should be probably created in root only writable directory
before dropping EUID.
Break-Fix: 237fead619984cc48818fe12ee0ceada3f55b012
764355487ea220fdc2faf128d577d7f679b91f97
To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/732628/+subscriptions
References