Changelog for
ecryptfs-utils-debugsource-103-57.1.i586.rpm :
Thu Aug 15 14:00:00 2013 darinAATTdarins.net
- fix %postun to not run pam-config on update (bnc#814098, bnc#834993)
Mon Aug 5 14:00:00 2013 darinAATTdarins.net
- update to 103
- move -pie/-fpie into separate patch
- update ecryptfs-setup-swap-SuSE.patch for systmd and fstab
without UUID lables
- remove ecryptfs-utils.security.patch, fixed upstream
- add PreReq: permissions
- removed unpackaged doc
Wed Jul 11 14:00:00 2012 meissnerAATTsuse.com
- also supply MS_NODEV to avoid exposing device files
if someone got them on the encrypted media.
Tue Jul 10 14:00:00 2012 meissnerAATTsuse.com
- point the desktop link to the right .desktop file
- build mount.ecryptfs_private with -pie/-fpie
Wed Jul 4 14:00:00 2012 meissnerAATTsuse.com
- hook pam_ecryptfs into pam session and auth bnc#755475
Thu Jun 21 14:00:00 2012 meissnerAATTsuse.com
- added security improvements to mount.ecryptfs_private
and pam_ecryptfs (bnc#740110)
Fri Apr 6 14:00:00 2012 darinAATTdarins.net
- patch so ecryptfs-setup-swap executes boot.crypto
Wed Mar 28 14:00:00 2012 meissnerAATTsuse.com
- updated to 96
- bugfixes
- testsuite added
- ecryptfs-verify utility added
- write-read test utility
- mark /sbin/mount.eccryptfs_private as setuidable (bnc#745584 , bnc#740110)
Fri Sep 30 14:00:00 2011 cooloAATTsuse.com
- add libtool as buildrequire to make the spec file more reliable
Tue Sep 20 14:00:00 2011 meissnerAATTsuse.de
- Updated to 92
* Fix umask issue introduced by last security update
* some bugfixes
Sun Sep 18 14:00:00 2011 jengelhAATTmedozas.de
- Remove redundant/obsolete tags/sections from specfile
(cf. packaging guidelines)
- Put make call in the right spot
- Use %_smp_mflags for parallel build
Thu Aug 11 14:00:00 2011 meissnerAATTsuse.de
- Updated to 90
Fixed several security issues:
* CVE-2011-1831 - Race condition when checking mountpoint during mount.
* CVE-2011-1832 - Race condition when checking mountpoint during unmount.
* CVE-2011-1833 - Race condition when checking source during mount.
* CVE-2011-1834 - Improper mtab handling allowing corruption due to resource
limits, signals, etc.
* CVE-2011-1835 - Key poisoning in ecryptfs-setup-private due to insecure temp
directory.
* CVE-2011-1836 - ecryptfs-recover-private mounts directly in /tmp
* CVE-2011-1837 - Predictable lock counter name and associated races.
New ecryptfs-find binary to find by inode.
Mon Apr 18 14:00:00 2011 meissnerAATTsuse.de
- Updated to 87
* src/utils/ecryptfs-setup-private: update the Private.
* selinux
contexts
* src/utils/ecryptfs-setup-private:
- add -p to mkdir, address noise for a non-error
- must insert keys during testing phase, since we remove keys on
unmount now, LP: #725862
* src/utils/ecryptfs_rewrap_passphrase.c: confirm passphrases in
interactive mode, LP: #667331
- Updated to 86
* src/pam_ecryptfs/pam_ecryptfs.c:
- check if this file exists and ask the user for the wrapping passphrase
if it does
- eliminate both ecryptfs_pam_wrapping_independent_set() and
ecryptfs_pam_automount_set() and replace with a reusable
file_exists_dotecryptfs() function
* src/utils/mount.ecryptfs_private.c:
- support multiple, user configurable private directories by way of
a command line \"alias\" argument
- this \"alias\" references a configuration file by the name of:
$HOME/.ecryptfs/alias.conf, which is in an fstab(5) format,
as well as $HOME/.ecryptfs/alias.sig, in the same format as
Private.sig
- if no argument specified, the utility operates in legacy mode,
defaulting to \"Private\"
- rename variables, s/dev/src/ and s/mnt/dest/
- add a read_config() function
- add an alias char
* to replace the #defined ECRYPTFS_PRIVATE_DIR
- this is half of the fix to LP: #615657
* doc/manpage/mount.ecryptfs_private.1: document these changes
* src/libecryptfs/main.c, src/utils/mount.ecryptfs_private.c:
- allow umount.ecryptfs_private to succeed when the key is no
longer in user keyring.
- Updated to 85
* src/utils/ecryptfs-recover-private: clean sigs of invalid characters
* src/utils/mount.ecryptfs_private.c:
- fix bug LP: #313812, clear used keys on unmount
- add ecryptfs_unlink_sigs to the mount opts, so that unmounts from
umount.ecryptfs behave similarly
- use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek
* src/utils/ecryptfs-migrate-home:
- support user databases outside of /etc/passwd, LP: #627506
- Updated to 84
* src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139
* debian/rules, debian/control:
- disable the gpg key module, as it\'s not yet functional
- clean up unneeded build-deps
- also, not using opencryptoki either
* doc/manpage/ecryptfs.7: fix minor documentation bug, reported by
email by Jon \'maddog\' Hall
* doc/manpage/ecryptfs-recover-private.1, doc/manpage/Makefile.am,
po/POTFILES.in, src/utils/ecryptfs-recover-private,
src/utils/Makefile.am: add a utility to simplify data recovery
of an encrypted private directory from a Live ISO, LP: #689969
Sat Apr 10 14:00:00 2010 ajAATTsuse.de
- Fix build with adding requires on mozilla-nss-devel and python-devel.
- Fix package list.
Thu Mar 18 13:00:00 2010 meissnerAATTsuse.de
- Updated to 83
- lots of bugfixes
- improvements
Sun Jan 31 13:00:00 2010 jengelhAATTmedozas.de
- Package baselibs.conf
Thu Jun 25 14:00:00 2009 sbrabecAATTsuse.cz
- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).