Change logs for ecryptfs-utils source package in Lucid

  • ecryptfs-utils (83-0ubuntu3.2.10.04.6) lucid-security; urgency=medium
    
      * SECURITY UPDATE: Mount passphrase wrapped with a default salt value
        - src/libecryptfs/key_management.c, src/include/ecryptfs.h: Generate a
          random salt when wrapping the mount passphrase.
        - src/pam_ecryptfs/pam_ecryptfs.c: If a user has a mount passphrase that was
          wrapped using the default salt, their mount passphrase will be rewrapped
          using a random salt when they log in with their password.
        - src/libecryptfs/key_management.c: Create a temporary file when creating
          a new wrapped-passphrase file and copy it to its final destination after
          the file has been fully synced to disk (LP: #1020902)
        - CVE-2014-9687
     -- Tyler Hicks <email address hidden>   Wed, 04 Mar 2015 16:26:45 -0600
  • ecryptfs-utils (83-0ubuntu3.2.10.04.3) lucid-proposed; urgency=low
    
      * src/libecryptfs/key_management.c: LP: #725862
        - fix nasty bug affecting users who do *not* encrypt filenames;
          the first login works, but on logout, only one key gets
          cleaned out; subsequent logins do not insert the necessary key
          due to an early "goto out"
     -- Dustin Kirkland <email address hidden>   Fri, 02 Sep 2011 17:47:02 -0500
  • ecryptfs-utils (83-0ubuntu3.2.10.04.2) lucid-security; urgency=low
    
      * SECURITY UPDATE: wrong mtab ownership and permissions (LP: #830850)
        - src/utils/mount.ecryptfs_private.c: also set gid and umask before
          updating mtab.
        - CVE-2011-3145
     -- Marc Deslauriers <email address hidden>   Mon, 22 Aug 2011 15:44:59 -0400
  • ecryptfs-utils (83-0ubuntu3.2.10.04.1) lucid-security; urgency=low
    
      * SECURITY UPDATE: privilege escalation via mountpoint race conditions
        (LP: #732628)
        - src/utils/mount.ecryptfs_private.c: chdir into mountpoint before
          checking permissions. Patch thanks to Dan Rosenberg.
        - CVE-2011-1831
        - CVE-2011-1832
      * SECURITY UPDATE: race condition when checking source during mount
        (LP: #732628)
        - src/utils/mount.ecryptfs_private.c: use new ecryptfs_check_dev_ruid
          kernel option when mounting directory.
        - CVE-2011-1833
      * SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
        - src/utils/mount.ecryptfs_private.c: modify mtab via a temp file first
          and make sure it succeeds before replacing the real mtab. Patch
          thanks to Dan Rosenberg.
        - CVE-2011-1834
      * SECURITY UPDATE: key poisoning via insecure temp directory handling
        (LP: #732628)
        - src/utils/ecryptfs-setup-private: make sure we don't copy into a
          user controlled directory.
        - CVE-2011-1835
      * SECURITY UPDATE: arbitrary file overwrite via lock counter race
        condition (LP: #732628)
        - src/utils/mount.ecryptfs_private.c: verify permissions with a file
          descriptor, and don't follow symlinks.
        - CVE-2011-1837
     -- Marc Deslauriers <email address hidden>   Thu, 04 Aug 2011 10:37:00 -0400
  • ecryptfs-utils (83-0ubuntu3.1) lucid-proposed; urgency=low
    
      * Cherry pick upstream bzr commit r520
      * src/utils/mount.ecryptfs_private.c:
        - fix bug LP: #313812, clear used keys on unmount
        - add ecryptfs_unlink_sigs to the mount opts, so that unmounts from
          umount.ecryptfs behave similarly
        - use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek
     -- Dustin Kirkland <email address hidden>   Fri, 11 Feb 2011 17:21:59 -0600
  • ecryptfs-utils (83-0ubuntu3) lucid; urgency=low
    
      * src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139
     -- Dustin Kirkland <email address hidden>   Thu, 18 Feb 2010 18:07:48 -0600
  • ecryptfs-utils (83-0ubuntu2) lucid; urgency=low
    
      * debian/rules, debian/control: disable the gpg key module,
        as it's not yet functional; does more harm than good to build it;
        should not be in 10.04 LTS; clean up build-deps; also, not using
        opencryptoki either; unbreak the build for 32-bit Lucid
     -- Dustin Kirkland <email address hidden>   Wed, 17 Feb 2010 16:20:35 -0600
  • ecryptfs-utils (83-0ubuntu1) lucid; urgency=low
    
      [ David Planella ]
      * Makefile.am, configure.ac, debian/control, debian/po/POTFILES.sh,
        debian/po/ecryptfs-utils.pot, debian/po/fr.po, debian/rules,
        po/POTFILES.in, src/desktop/Makefile.am,
        src/desktop/ecryptfs-mount-private.desktop,
        src/desktop/ecryptfs-mount-private.desktop.in,
        src/desktop/ecryptfs-record-passphrase,
        src/desktop/ecryptfs-setup-private.desktop,
        src/desktop/ecryptfs-setup-private.desktop.in:
        - internationalization work for LP: #358283
      * po/LINGUAS, po/ca.po: Catalan translation
    
      [ Yan Li <email address hidden> ]
      * src/pam_ecryptfs/pam_ecryptfs.c, src/utils/Makefile.am,
        src/utils/ecryptfs-migrate-home: add a script and pam hooks to
        support automatic migration to encrypted home directory
    
      [ Dustin Kirkland ]
      * src/utils/ecryptfs-migrate-home: clean up for merge
        - use $() rather than ``
        - drop set -u
        - use = and !=, and quote vars, rather than testing with -ne, -eq,
          for better shell portability
        - improve usage statement and error text
        - check if already encrypted
        - handle migration of multiple users on boot
        - fix all whitespace, use tabs for indents
        - use quotes around variables, rather than ${} (stylistic preference)
        - major simplification for immediate release
          + remove boot and user modes; only support administrator mode for
            security reasons and to avoid race conditions
          + other modes can be re-added, if necessary, and if security
            concerns can be addressed
        - ensure running as root
        - drop VERBOSE option, always print useful info messages
        - call the user $USER_NAME rather than $USER_ID since id implies
          number, and here we're deailing with names
        - no decimals on awk calculation
        - mktemp on the target user, not root
        - check that there is enough disk space available to do the migration
        - ensure the user's homedir group is correct
        - add critical instructions, user *must* login after the migration and
          before the reboot, as their wrapped passphrase will be cleared on
          reboot (possible we should use an init script to move these to
          /var/tmp on reboot)
        - ensure permissions are set correctly
        - improve text at the end of the migration, organize into notes
      * ecryptfs-utils.ecryptfs-utils-restore.upstart,
        ecryptfs-utils.ecryptfs-utils-save.upstart, rules:
        - try to protect migrating users who don't login before the next reboot
      * debian/ecryptfs-utils.install: install the locale messages
      * src/desktop/ecryptfs-record-passphrase: improve dialog text
      * src/desktop/ecryptfs-record-passphrase: revert the _ bit, as it's not quite
        working yet, will need to talk to David to fix
      * Mark LP: #471725 as fixed
     -- Dustin Kirkland <email address hidden>   Wed, 17 Feb 2010 15:17:09 -0600
  • ecryptfs-utils (82-0ubuntu2) lucid; urgency=low
    
      * debian/rules: fix FTBFS, CFLAGS needed for libgcrypt11-dev linking
     -- Dustin Kirkland <email address hidden>   Tue, 10 Nov 2009 12:05:58 -0600
  • ecryptfs-utils (82-0ubuntu1) lucid; urgency=low
    
      * Merging upstream release
     -- Dustin Kirkland <email address hidden>   Tue, 10 Nov 2009 11:36:15 -0600
  • ecryptfs-utils (81-0ubuntu3) karmic; urgency=low
    
      * src/utils/ecryptfs-setup-private, debian/control: LP: #456565
        - fix typo, s/getext/gettext
        - depend on gettext-base
    
     -- Dustin Kirkland <email address hidden>   Tue, 20 Oct 2009 13:42:43 -0500