-
ecryptfs-utils (100-0ubuntu1.1) quantal-proposed; urgency=low
* Fix encrypted home/private race condition that could result in encrypted
filenames not being decrypted, despite the directory being mounted
correctly otherwise. (LP: #1052038)
- debian/patches/fix-private-mount-race.patch: Fix race condition by only
opening the signature file once, rather than opening, reading, and
closing it for each key signature.
-- Tyler Hicks <email address hidden> Tue, 04 Dec 2012 14:12:27 -0600
-
ecryptfs-utils (100-0ubuntu1) quantal; urgency=low
[ Tyler Hicks ]
* src/pam_ecryptfs/pam_ecryptfs.c, src/libecryptfs/key_management.c:
LP: #1024476
- fix regression introduced in ecryptfs-utils-99 when Encrypted
Home/Private is in use and the eCryptfs kernel code is compiled as a
module
- drop check for kernel filename encryption support in pam_ecryptfs, as
appropriate privileges to load the eCryptfs kernel module may not be
available and filename encryption has been supported since 2.6.29
- always add filename encryption key to the kernel keyring from pam mount
[ Colin King ]
* tests/kernel/inode-race-stat/test.c:
- limit number of forks based on fd limits
* tests/kernel/enospc.sh, tests/kernel/enospc/test.c,
tests/kernel/Makefile.am, tests/kernel/tests.rc:
- add test case for ENOSPC
[ Tim Harder ]
* m4/ac_python_devel.m4: LP: #1029217
- properly save and restore CPPFLAGS and LIBS when python support is
enabled
-- Dustin Kirkland <email address hidden> Thu, 02 Aug 2012 16:33:55 -0500
-
ecryptfs-utils (99-0ubuntu1) quantal; urgency=low
[ Dustin Kirkland ]
* debian/ecryptfs-utils.postinst: LP: #936093
- ensure desktop file is executable
* precise
[ Wesley Wiedenmeier ]
* src/utils/mount.ecryptfs.c: LP: #329264
- remove old hack, that worked around a temporary kernel regression;
ensure that all mount memory is mlocked
[ Sebastian Krahmer ]
* src/pam_ecryptfs/pam_ecryptfs.c: LP: #732614
- drop group privileges in the same places that user privileges are
dropped
- check return status of setresuid() calls and return if they fail
- drop privileges before checking for the existence of
~/.ecryptfs/auto-mount to prevent possible file existence leakage
by a symlink to a path that typically would not be searchable by
the user
- drop privileges before reading salt from the rc file to prevent the
leakage of root's salt and, more importantly, using the incorrect salt
- discovered, independently, by Vasiliy Kulikov and Sebastian Krahmer
* src/pam_ecryptfs/pam_ecryptfs.c: LP: #1020904
- after dropping privileges, clear the environment before executing the
private eCryptfs mount helper
- discovered by Sebastian Krahmer
* src/utils/mount.ecryptfs_private.c: LP: #1020904
- do not allow private eCryptfs mount aliases to contain ".." characters
as a preventative measure against a crafted file path being used as an
alias
- force the MS_NOSUID mount flag to protect against user controlled lower
filesystems, such as an auto mounted USB drive, that may contain a
setuid-root binary
+ CVE-2012-3409
- force the MS_NODEV mount flag
- after dropping privileges, clear the environment before executing umount
- discovered by Sebastian Krahmer
[ Tyler Hicks ]
* src/libecryptfs/key_management.c: LP: #732614
- zero statically declared buffers to prevent the leakage of stack
contents in the case of a short file read
- discovered by Vasiliy Kulikov
* src/libecryptfs/module_mgr.c, src/pam_ecryptfs/pam_ecryptfs.c:
- fix compiler warnings
-- Dustin Kirkland <email address hidden> Fri, 13 Jul 2012 09:52:36 -0500
-
ecryptfs-utils (98-0ubuntu1) quantal; urgency=low
[ Dustin Kirkland ]
* debian/ecryptfs-utils.prerm:
- drop the pre-removal ERRORs down to WARNINGs
- these have caused a ton of trouble; whatever is causing ecryptfs-utils
to be marked for removal should be fixed; but ecryptfs exiting 1 seems
to be causing more trouble than it's worth
- LP: #871021, #812270, #988960, #990630, #995381, #1010961
* doc/ecryptfs-faq.html:
- update the frequently asked questions, which haven't seen much
attention in a while now
- drop a few references to sourceforge
* doc/ecryptfs-pam-doc.txt, doc/manpage/fr/ecryptfs-add-passphrase.1,
doc/manpage/fr/ecryptfs-generate-tpm-key.1, doc/manpage/fr/ecryptfs-
insert-wrapped-passphrase-into-keyring.1, doc/manpage/fr/ecryptfs-
mount-private.1, doc/manpage/fr/ecryptfs-rewrap-passphrase.1,
doc/manpage/fr/ecryptfs-setup-private.1, doc/manpage/fr/ecryptfs-
umount-private.1, doc/manpage/fr/ecryptfs-unwrap-passphrase.1,
doc/manpage/fr/ecryptfs-wrap-passphrase.1, doc/manpage/fr/ecryptfs-
zombie-kill.1, doc/manpage/fr/ecryptfs-zombie-list.1,
doc/sourceforge_webpage/ecryptfs-article.pdf,
doc/sourceforge_webpage/ecryptfs_design_doc_v0_1.pdf,
doc/sourceforge_webpage/ecryptfs-faq.html,
doc/sourceforge_webpage/ecryptfs-key-diagram-356.png,
doc/sourceforge_webpage/ecryptfs-key-diagram-640.png,
doc/sourceforge_webpage/ecryptfs-pageuptodate-call-graph.png,
doc/sourceforge_webpage/ecryptfs-pam-doc.txt,
doc/sourceforge_webpage/ecryptfs.pdf,
doc/sourceforge_webpage/index.html, doc/sourceforge_webpage/README,
=== removed directory doc/manpage/fr, === removed directory
doc/sourceforge_webpage, rpm/ecryptfs-utils.spec:
- remove some deprecated documentation
- fish it out of bzr, if we ever need it again, but let's
quit publishing it in our release tarballs
* precise
-- Dustin Kirkland <email address hidden> Sun, 24 Jun 2012 11:40:53 -0500
-
ecryptfs-utils (97-0ubuntu1) quantal; urgency=low
[ Kees Cook ]
* src/pam_ecryptfs/pam_ecryptfs.c: LP: #938326
- exit, rather than return to prevent duplicate processes
[ Andreas Raster ]
* src/desktop/ecryptfs-find:
- $mounts was quoted once too often
[ George Wilson ]
* src/key_mod/ecryptfs_key_mod_openssl.c,
src/key_mod/ecryptfs_key_mod_pkcs11_helper.c,
src/key_mod/ecryptfs_key_mod_tspi.c: LP: #937331
- IBM would like to grant a license exception for key modules that
require linking to OpenSSL. The change should make the modules
shippable by Linux distributions
[ Dustin Kirkland ]
* debian/copyright:
- note the GPLv2 SSL exception granted by IBM for the key modules
* debian/control, debian/copyright, doc/manpage/ecryptfs.7,
doc/manpage/ecryptfs-add-passphrase.1, doc/manpage/ecryptfsd.8,
doc/manpage/ecryptfs-generate-tpm-key.1, doc/manpage/ecryptfs-
insert-wrapped-passphrase-into-keyring.1, doc/manpage/ecryptfs-
manager.8, doc/manpage/ecryptfs-mount-private.1,
doc/manpage/ecryptfs-recover-private.1, doc/manpage/ecryptfs-rewrap-
passphrase.1, doc/manpage/ecryptfs-rewrite-file.1,
doc/manpage/ecryptfs-setup-private.1, doc/manpage/ecryptfs-setup-
swap.1, doc/manpage/ecryptfs-stat.1, doc/manpage/ecryptfs-umount-
private.1, doc/manpage/ecryptfs-unwrap-passphrase.1,
doc/manpage/ecryptfs-wrap-passphrase.1,
doc/manpage/mount.ecryptfs.8, doc/manpage/mount.ecryptfs_private.1,
doc/manpage/pam_ecryptfs.8, doc/manpage/umount.ecryptfs.8,
doc/manpage/umount.ecryptfs_private.1, README,
src/utils/mount.ecryptfs.c:
- use the new ecryptfs.org website where appropriate
* debian/control:
- update to suggest zescrow-client
* precise
[ Sergio Peña ]
* src/libecryptfs/cipher_list.c: LP: #922821
- add the new name of the blowfish cipher (linux >= 3.2)
* src/include/ecryptfs.h, src/libecryptfs/main.c,
src/utils/mount.ecryptfs.c: LP: #917509
- use execl() to mount ecryptfs
- this allows us to support any arbitrary mount options in
/etc/fstab
[ Tyler Hicks ]
* doc/manpage/ecryptfs.7:
- Remove the note saying that the passphrase and openssl key modules are
available by default. That's true upstream but not always true in distro
builds.
* tests/run_tests.sh:
- Make upper and lower mount point arguments optional by automatically
creating directories in /tmp by default.
- Make it possible to run only userspace tests without having to specify
unused mount information
- Accept a comma-separated list of lower filesystems to test on and loop
through all kernel tests for each lower filesystem
- Accept a comma-separated list of tests to run
* tests/lib/etl_funcs.sh:
- Unset $ETL_DISK just before etl_remove_disk() successfully returns
* tests/userspace/Makefile.am:
- Also build 'make check' tests when building with --enable-tests
* include/ecryptfs.h, libecryptfs/Makefile.am,
libecryptfs/cipher_list.c, libecryptfs/module_mgr.c,
utils/io.h: LP: #994813
- remove overly complicated implementation to detect what ciphers
are supported by the currently running kernel's crypto api
- prompt for the entire supported cipher list, if the user selects a
cipher that their kernel doesn't support, the mount will fail
and the kernel will write an error message to the syslog
* src/libecryptfs/module_mgr.c:
- Use correct blowfish block size when displaying supported ciphers to
the user
* tests/kernel/lp-1009207.sh, tests/kernel/Makefile.am,
tests/kernel/tests.rc:
- Add simple test case for incorrect handling of umask and default POSIX
ACL masks
* tests/kernel/lp-994247.sh, tests/kernel/lp-994247/test.c,
tests/kernel/Makefile.am, tests/kernel/tests.rc:
- Add test case for incorrect handling of open /dev/ecryptfs file
descriptors that are passed or inherited by other processes
[ Colin King ]
* tests/lib/etl_funcs.sh:
- etl_lumount() should use DST rather than SRC dir so it can run on Lucid
- use file system appropriate mkfs force flag
- cater for correct ext2 default mount flags
* tests/kernel/lp-509180.sh, tests/kernel/lp-509180/test.c:
- test for trailing garbage at end of files
* tests/kernel/lp-524919.sh, tests/kernel/lp-524919/test.c:
- test case for checking lstat/readlink size
* tests/kernel/lp-870326.sh, tests/kernel/lp-870326/test.c:
- test case for open(), mmap(), close(), modify mmap'd region
* tests/kernel/lp-469664.sh:
- test case for lsattr
* tests/kernel/lp-613873.sh:
- test case for stat modify time
* tests/kernel/lp-745836.sh:
- test case for clearing ECRYPTFS_NEW_FILE flag during truncate
* tests/lib/etl_funcs.sh, tests/kernel/extend-file-random.sh,
tests/kernel/trunc-file.sh (LP: #1007159):
- Add test library function for estimating available space in lower fs
- Use new library function in tests that need to create large files
[ Colin Watson ]
* src/utils/ecryptfs-setup-swap: Skip /dev/zram* swap devices
LP: #979350
[ Serge Hallyn ]
* src/utils/mount.ecryptfs_private.c:
- EoL fixes
-- Dustin Kirkland <email address hidden> Fri, 15 Jun 2012 09:28:58 -0500
-
ecryptfs-utils (96-0ubuntu3) precise; urgency=low
* src/utils/ecryptfs-setup-swap: Skip /dev/zram* swap devices
(LP: #979350).
-- Colin Watson <email address hidden> Wed, 18 Apr 2012 15:52:45 +0100