Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ecryptfs-utils-96-3.3.2 RPM for i586

From OpenSuSE 12.2 for i586

Name: ecryptfs-utils Distribution: openSUSE 12.2
Version: 96 Vendor: openSUSE
Release: 3.3.2 Build date: Mon Jul 16 04:32:31 2012
Group: Productivity/Security Build host: build35
Size: 551296 Source RPM: ecryptfs-utils-96-3.3.2.src.rpm
Summary: Userspace Utilities for ecryptfs
A stacked cryptographic filesystem for Linux.






* Wed Jul 11 2012
  - also supply MS_NODEV to avoid exposing device files
    if someone got them on the encrypted media.
* Tue Jul 10 2012
  - point the desktop link to the right .desktop file
  - build mount.ecryptfs_private with -pie/-fpie
* Wed Jul 04 2012
  - hook pam_ecryptfs into pam session and auth bnc#755475
* Thu Jun 21 2012
  - added security improvements to mount.ecryptfs_private
    and pam_ecryptfs (bnc#740110)
* Fri Apr 06 2012
  - patch so ecryptfs-setup-swap executes boot.crypto
* Wed Mar 28 2012
  - updated to 96
    - bugfixes
    - testsuite added
    - ecryptfs-verify utility added
    - write-read test utility
  - mark /sbin/mount.eccryptfs_private as setuidable (bnc#745584 , bnc#740110)
* Fri Sep 30 2011
  - add libtool as buildrequire to make the spec file more reliable
* Tue Sep 20 2011
  - Updated to 92
    * Fix umask issue introduced by last security update
    * some bugfixes
* Sun Sep 18 2011
  - Remove redundant/obsolete tags/sections from specfile
    (cf. packaging guidelines)
  - Put make call in the right spot
  - Use %_smp_mflags for parallel build
* Thu Aug 11 2011
  - Updated to 90
    Fixed several security issues:
    * CVE-2011-1831 - Race condition when checking mountpoint during mount.
    * CVE-2011-1832 - Race condition when checking mountpoint during unmount.
    * CVE-2011-1833 - Race condition when checking source during mount.
    * CVE-2011-1834 - Improper mtab handling allowing corruption due to resource
      limits, signals, etc.
    * CVE-2011-1835 - Key poisoning in ecryptfs-setup-private due to insecure temp
    * CVE-2011-1836 - ecryptfs-recover-private mounts directly in /tmp
    * CVE-2011-1837 - Predictable lock counter name and associated races.
    New ecryptfs-find binary to find by inode.
* Mon Apr 18 2011
  - Updated to 87
    * src/utils/ecryptfs-setup-private: update the Private.* selinux
    * src/utils/ecryptfs-setup-private:
    - add -p to mkdir, address noise for a non-error
    - must insert keys during testing phase, since we remove keys on
      unmount now, LP: #725862
    * src/utils/ecryptfs_rewrap_passphrase.c: confirm passphrases in
      interactive mode, LP: #667331
  - Updated to 86
    * src/pam_ecryptfs/pam_ecryptfs.c:
    - check if this file exists and ask the user for the wrapping passphrase
      if it does
    - eliminate both ecryptfs_pam_wrapping_independent_set() and
      ecryptfs_pam_automount_set() and replace with a reusable
      file_exists_dotecryptfs() function
    * src/utils/mount.ecryptfs_private.c:
    - support multiple, user configurable private directories by way of
      a command line "alias" argument
    - this "alias" references a configuration file by the name of:
      $HOME/.ecryptfs/alias.conf, which is in an fstab(5) format,
      as well as $HOME/.ecryptfs/alias.sig, in the same format as
    - if no argument specified, the utility operates in legacy mode,
      defaulting to "Private"
    - rename variables, s/dev/src/ and s/mnt/dest/
    - add a read_config() function
    - add an alias char* to replace the #defined ECRYPTFS_PRIVATE_DIR
    - this is half of the fix to LP: #615657
    * doc/manpage/mount.ecryptfs_private.1: document these changes
    * src/libecryptfs/main.c, src/utils/mount.ecryptfs_private.c:
    - allow umount.ecryptfs_private to succeed when the key is no
      longer in user keyring.
  - Updated to 85
    * src/utils/ecryptfs-recover-private: clean sigs of invalid characters
    * src/utils/mount.ecryptfs_private.c:
    - fix bug LP: #313812, clear used keys on unmount
    - add ecryptfs_unlink_sigs to the mount opts, so that unmounts from
      umount.ecryptfs behave similarly
    - use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek
    * src/utils/ecryptfs-migrate-home:
    - support user databases outside of /etc/passwd, LP: #627506
  - Updated to 84
    * src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139
    * debian/rules, debian/control:
    - disable the gpg key module, as it's not yet functional
    - clean up unneeded build-deps
    - also, not using opencryptoki either
    * doc/manpage/ecryptfs.7: fix minor documentation bug, reported by
      email by Jon 'maddog' Hall
    * doc/manpage/ecryptfs-recover-private.1, doc/manpage/,
      po/, src/utils/ecryptfs-recover-private,
      src/utils/ add a utility to simplify data recovery
      of an encrypted private directory from a Live ISO, LP: #689969
* Sat Apr 10 2010
  - Fix build with adding requires on mozilla-nss-devel and python-devel.
  - Fix package list.
* Thu Mar 18 2010
  - Updated to 83
    - lots of bugfixes
    - improvements
* Sun Jan 31 2010
  - Package baselibs.conf
* Thu Jun 25 2009
  - Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).



Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Jul 10 03:07:56 2017