I am noticing on my other Desktop Ubuntu 11.04 drive which I booted to
submit this report, The Update Manager has Important security updates:

ecryptfs cryptografic filesystem (utilities) ecryptfs-utils (Size: 102
KB)

ecryptfs cryptografic filesystem (library) libecryptfs0 (Size: 65 KB)

--------------------------------------------
It looks like this could possibly be the cause since it was recently Updated.

--------------------------------------------
Changes Listed on update:

Changes for the versions:
87-0ubuntu1
87-0ubuntu1.1

Version 87-0ubuntu1.1:

  * SECURITY UPDATE: privilege escalation via mountpoint race conditions
    (LP: #732628)
    - debian/patches/CVE-2011-1831,1832,1834.patch: chdir into mountpoint
      before checking permissions in src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1831
    - CVE-2011-1832
  * SECURITY UPDATE: race condition when checking source during mount
    (LP: #732628)
    - debian/patches/CVE-2011-1833.patch: use new ecryptfs_check_dev_ruid
      kernel option when mounting directory in
      src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1833
  * SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
    - debian/patches/CVE-2011-1831,1832,1834.patch: modify mtab via a temp
      file first and make sure it succeeds before replacing the real mtab
      in src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1834
  * SECURITY UPDATE: key poisoning via insecure temp directory handling
    (LP: #732628)
    - debian/patches/CVE-2011-1835.patch: make sure we don't copy into a
      user controlled directory in src/utils/ecryptfs-setup-private.
    - CVE-2011-1835
  * SECURITY UPDATE: information disclosure via recovery mount in /tmp
    (LP: #732628)
    - debian/patches/CVE-2011-1836.patch: mount inside protected
      subdirectory in src/utils/ecryptfs-recover-private.
    - CVE-2011-1836
  * SECURITY UPDATE: arbitrary file overwrite via lock counter race
    condition (LP: #732628)
    - debian/patches/CVE-2011-1837.patch: verify permissions with a file
      descriptor, and don't follow symlinks in
      src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1837
----------------------------------------
Description:

eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem 
for Linux.
It provides advanced key management and policy features. eCryptfs stores 
cryptographic metadata in the header of each file written, so that encrypted 
files can be copied between hosts; the file will be decryptable with the proper 
key, and there is no need to keep track of any additional information aside 
from what is already in the encrypted file itself. Think of eCryptfs as a sort 
of "gnupgfs".
eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs 
is part of the Linux kernel since 2.6.19.
This package contains the userland utilities.

-------------------------------------
Changes:

Changes for the versions:
87-0ubuntu1
87-0ubuntu1.1

Version 87-0ubuntu1.1:

  * SECURITY UPDATE: privilege escalation via mountpoint race conditions
    (LP: #732628)
    - debian/patches/CVE-2011-1831,1832,1834.patch: chdir into mountpoint
      before checking permissions in src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1831
    - CVE-2011-1832
  * SECURITY UPDATE: race condition when checking source during mount
    (LP: #732628)
    - debian/patches/CVE-2011-1833.patch: use new ecryptfs_check_dev_ruid
      kernel option when mounting directory in
      src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1833
  * SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
    - debian/patches/CVE-2011-1831,1832,1834.patch: modify mtab via a temp
      file first and make sure it succeeds before replacing the real mtab
      in src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1834
  * SECURITY UPDATE: key poisoning via insecure temp directory handling
    (LP: #732628)
    - debian/patches/CVE-2011-1835.patch: make sure we don't copy into a
      user controlled directory in src/utils/ecryptfs-setup-private.
    - CVE-2011-1835
  * SECURITY UPDATE: information disclosure via recovery mount in /tmp
    (LP: #732628)
    - debian/patches/CVE-2011-1836.patch: mount inside protected
      subdirectory in src/utils/ecryptfs-recover-private.
    - CVE-2011-1836
  * SECURITY UPDATE: arbitrary file overwrite via lock counter race
    condition (LP: #732628)
    - debian/patches/CVE-2011-1837.patch: verify permissions with a file
      descriptor, and don't follow symlinks in
      src/utils/mount.ecryptfs_private.c.
    - CVE-2011-1837

------------------------------------
Description:

eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem 
for Linux.
This package contains the library.
-------------------------------------




** CVE added: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1831

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1832

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1833

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1834

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1835

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1836

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1837

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/824961

Title:
  Ubuntu 11.04 Server with encrypted LVM on dm RAID0 -- Incorrect
  metadata area header checksum - No volume groups found - ALERT!
  /dev/mapper/MachineName-root does not exist

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/824961/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to