Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs incorrectly validated permissions on the requested source directory. A local attacker could use this flaw to mount an arbitrary directory, possibly leading to information disclosure. Upstream fix: 764355487ea220fdc2faf128d577d7f679b91f97 References: https://bugs.launchpad.net/ecryptfs/+bug/732628
(In reply to comment #0) > Upstream fix: > 764355487ea220fdc2faf128d577d7f679b91f97 http://git.kernel.org/?p=linux/kernel/git/ecryptfs/ecryptfs-2.6.git;a=commitdiff;h=764355487ea220fdc2faf128d577d7f679b91f97 ecryptfs-utils patch to make it use new mount option: https://bugzilla.redhat.com/show_bug.cgi?id=729465#c2
Acknowledgements: Red Hat would like to thank the Ubuntu Security Team for reporting this issue. The Ubuntu Security Team acknowledges Vasiliy Kulikov of Openwall and Dan Rosenberg as the original reporters.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:1350 https://rhn.redhat.com/errata/RHSA-2011-1350.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2011:1386 https://rhn.redhat.com/errata/RHSA-2011-1386.html
Created kernel tracking bugs for this issue Affects: fedora-all [bug 748695]