|Index||index by Group||index by Distribution||index by Vendor||index by creation date||index by Name||Mirrors||Help||Search|
|Name: ecryptfs-utils-32bit||Distribution: openSUSE 12.2|
|Version: 96||Vendor: openSUSE|
|Release: 3.3.2||Build date: Mon Jul 16 04:32:43 2012|
|Group: Productivity/Security||Build host: build35|
|Size: 264850||Source RPM: ecryptfs-utils-96-3.3.2.src.rpm|
|Summary: Userspace Utilities for ecryptfs|
A stacked cryptographic filesystem for Linux.
* Wed Jul 11 2012 email@example.com - also supply MS_NODEV to avoid exposing device files if someone got them on the encrypted media. * Tue Jul 10 2012 firstname.lastname@example.org - point the desktop link to the right .desktop file - build mount.ecryptfs_private with -pie/-fpie * Wed Jul 04 2012 email@example.com - hook pam_ecryptfs into pam session and auth bnc#755475 * Thu Jun 21 2012 firstname.lastname@example.org - added security improvements to mount.ecryptfs_private and pam_ecryptfs (bnc#740110) * Fri Apr 06 2012 email@example.com - patch so ecryptfs-setup-swap executes boot.crypto * Wed Mar 28 2012 firstname.lastname@example.org - updated to 96 - bugfixes - testsuite added - ecryptfs-verify utility added - write-read test utility - mark /sbin/mount.eccryptfs_private as setuidable (bnc#745584 , bnc#740110) * Fri Sep 30 2011 email@example.com - add libtool as buildrequire to make the spec file more reliable * Tue Sep 20 2011 firstname.lastname@example.org - Updated to 92 * Fix umask issue introduced by last security update * some bugfixes * Sun Sep 18 2011 email@example.com - Remove redundant/obsolete tags/sections from specfile (cf. packaging guidelines) - Put make call in the right spot - Use %_smp_mflags for parallel build * Thu Aug 11 2011 firstname.lastname@example.org - Updated to 90 Fixed several security issues: * CVE-2011-1831 - Race condition when checking mountpoint during mount. * CVE-2011-1832 - Race condition when checking mountpoint during unmount. * CVE-2011-1833 - Race condition when checking source during mount. * CVE-2011-1834 - Improper mtab handling allowing corruption due to resource limits, signals, etc. * CVE-2011-1835 - Key poisoning in ecryptfs-setup-private due to insecure temp directory. * CVE-2011-1836 - ecryptfs-recover-private mounts directly in /tmp * CVE-2011-1837 - Predictable lock counter name and associated races. New ecryptfs-find binary to find by inode. * Mon Apr 18 2011 email@example.com - Updated to 87 * src/utils/ecryptfs-setup-private: update the Private.* selinux contexts * src/utils/ecryptfs-setup-private: - add -p to mkdir, address noise for a non-error - must insert keys during testing phase, since we remove keys on unmount now, LP: #725862 * src/utils/ecryptfs_rewrap_passphrase.c: confirm passphrases in interactive mode, LP: #667331 - Updated to 86 * src/pam_ecryptfs/pam_ecryptfs.c: - check if this file exists and ask the user for the wrapping passphrase if it does - eliminate both ecryptfs_pam_wrapping_independent_set() and ecryptfs_pam_automount_set() and replace with a reusable file_exists_dotecryptfs() function * src/utils/mount.ecryptfs_private.c: - support multiple, user configurable private directories by way of a command line "alias" argument - this "alias" references a configuration file by the name of: $HOME/.ecryptfs/alias.conf, which is in an fstab(5) format, as well as $HOME/.ecryptfs/alias.sig, in the same format as Private.sig - if no argument specified, the utility operates in legacy mode, defaulting to "Private" - rename variables, s/dev/src/ and s/mnt/dest/ - add a read_config() function - add an alias char* to replace the #defined ECRYPTFS_PRIVATE_DIR - this is half of the fix to LP: #615657 * doc/manpage/mount.ecryptfs_private.1: document these changes * src/libecryptfs/main.c, src/utils/mount.ecryptfs_private.c: - allow umount.ecryptfs_private to succeed when the key is no longer in user keyring. - Updated to 85 * src/utils/ecryptfs-recover-private: clean sigs of invalid characters * src/utils/mount.ecryptfs_private.c: - fix bug LP: #313812, clear used keys on unmount - add ecryptfs_unlink_sigs to the mount opts, so that unmounts from umount.ecryptfs behave similarly - use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek * src/utils/ecryptfs-migrate-home: - support user databases outside of /etc/passwd, LP: #627506 - Updated to 84 * src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139 * debian/rules, debian/control: - disable the gpg key module, as it's not yet functional - clean up unneeded build-deps - also, not using opencryptoki either * doc/manpage/ecryptfs.7: fix minor documentation bug, reported by email by Jon 'maddog' Hall * doc/manpage/ecryptfs-recover-private.1, doc/manpage/Makefile.am, po/POTFILES.in, src/utils/ecryptfs-recover-private, src/utils/Makefile.am: add a utility to simplify data recovery of an encrypted private directory from a Live ISO, LP: #689969 * Sat Apr 10 2010 firstname.lastname@example.org - Fix build with adding requires on mozilla-nss-devel and python-devel. - Fix package list. * Thu Mar 18 2010 email@example.com - Updated to 83 - lots of bugfixes - improvements * Sun Jan 31 2010 firstname.lastname@example.org - Package baselibs.conf * Thu Jun 25 2009 email@example.com - Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
/lib/security /lib/security/pam_ecryptfs.so /usr/lib/ecryptfs /usr/lib/ecryptfs/libecryptfs_key_mod_openssl.so /usr/lib/ecryptfs/libecryptfs_key_mod_passphrase.so /usr/lib/ecryptfs/libecryptfs_key_mod_pkcs11_helper.so /usr/lib/ecryptfs/libecryptfs_key_mod_tspi.so /usr/lib/libecryptfs.la /usr/lib/libecryptfs.so /usr/lib/libecryptfs.so.0 /usr/lib/libecryptfs.so.0.0.0 /usr/lib/python2.7 /usr/lib/python2.7/site-packages /usr/lib/python2.7/site-packages/ecryptfs-utils /usr/lib/python2.7/site-packages/ecryptfs-utils/_libecryptfs.la /usr/lib/python2.7/site-packages/ecryptfs-utils/_libecryptfs.so /usr/lib/python2.7/site-packages/ecryptfs-utils/_libecryptfs.so.0 /usr/lib/python2.7/site-packages/ecryptfs-utils/_libecryptfs.so.0.0.0
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Jun 10 04:11:40 2016