[ubuntu/raring-proposed] ecryptfs-utils 101-0ubuntu1 (Accepted)

Dustin Kirkland kirkland at ubuntu.com
Sun Oct 28 20:56:24 UTC 2012


ecryptfs-utils (101-0ubuntu1) raring; urgency=low

  [ Eric Lammerts ]
  * src/libecryptfs/sysfs.c: LP: #1007880
    - Handle NULL mnt pointer when sysfs is not mounted

  [ Tyler Hicks ]
  * src/utils/ecryptfs-migrate-home: LP: #1026180
    - Correct minor misspelling
  * src/utils/ecryptfs-recover-private: LP: #1004082
    - Fix option parsing when --rw is specified
  * src/utils/ecryptfs-recover-private: LP: #1028923
    - Simplify success message to prevent incorrectly reporting that a
      read-only mount was performed when the --rw option is specified
  * tests/lib/etl_func.sh:
    - Add test library function to return a lower path from an upper path,
      based on inode numbers
  * tests/kernel/mmap-close.sh, tests/kernel/mmap-close/test.c:
    - Add regression test for open->mmap()->close()->dirty memory->munmap()
      pattern
  * tests/kernel/lp-561129.sh:
    - Add test for checking that a pre-existing target inode is properly
      evicted after a rename
  * tests/README:
    - Add documentation on the steps to take when adding new test cases

  [ Colin King ]
  * tests/kernel/lp-911507.sh:
    - Add test case for initializing empty lower files during open()
  * tests/kernel/lp-872905.sh:
    - Add test case to check for proper unlinking of lower files when
      lower file initialization fails
  * src/key_mod/ecryptfs_key_mod_openssl.c,
    src/key_mod/ecryptfs_key_mod_pkcs11_helper.c,
    src/libecryptfs/key_management.c,
    src/utils/mount.ecryptfs_private.c, src/utils/umount.ecryptfs.c:
    - address some issues raised by smatch static analysis
    - fix some memory leaks with frees
    - fix some pointer refs and derefs
    - fix some comment typos

  [ Dustin Kirkland ]
  * src/libecryptfs/key_management.c:
    - silence pam error message when errno == EACCES
      + "Error attempting to parse .ecryptfsrc file; rc = [-13]"
  * src/utils/mount.ecryptfs_private.c: LP: #1052038
    - fix race condition, which typically manifests itself with a user
      saying that their home directory is not accessible, or that their
      filenames are not decrypted
    - the root of the problem is that we were reading the signature file,
      ~/.ecryptfs/Private.sig, twice; in some cases, the first one succeeds,
      so the file encryption signature is read and key is loaded, but then
      some other process (usually from PAM, perhaps a cron job or a
      subsequent login) mounts the home directory before the filename
      encryption key is loaded;  thus, $HOME is mounted but filenames are
      not decrypted, so the second read of ~/.ecryptfs/Private.sig fails
      as that file is not found
    - the solution is to rework the internal fetch_sig() function and read
      one or both signatures within a single open/read/close operation of
      the file
    - free memory used by char **sig on failure
  * debian/copyright:
    - fix lintian warning
  * precise

Date: Thu, 25 Oct 2012 16:13:28 -0500
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
Signed-By: Adam Conrad <adconrad at 0c3.net>
https://launchpad.net/ubuntu/raring/+source/ecryptfs-utils/101-0ubuntu1
-------------- next part --------------
Format: 1.8
Date: Thu, 25 Oct 2012 16:13:28 -0500
Source: ecryptfs-utils
Binary: ecryptfs-utils ecryptfs-utils-dbg libecryptfs0 libecryptfs-dev python-ecryptfs
Architecture: source
Version: 101-0ubuntu1
Distribution: raring
Urgency: low
Maintainer: Dustin Kirkland <kirkland at ubuntu.com>
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
Description: 
 ecryptfs-utils - ecryptfs cryptographic filesystem (utilities)
 ecryptfs-utils-dbg - ecryptfs cryptographic filesystem (utilities; debug)
 libecryptfs-dev - ecryptfs cryptographic filesystem (development)
 libecryptfs0 - ecryptfs cryptographic filesystem (library)
 python-ecryptfs - ecryptfs cryptographic filesystem (python)
Launchpad-Bugs-Fixed: 1004082 1007880 1026180 1028923 1052038
Changes: 
 ecryptfs-utils (101-0ubuntu1) raring; urgency=low
 .
   [ Eric Lammerts ]
   * src/libecryptfs/sysfs.c: LP: #1007880
     - Handle NULL mnt pointer when sysfs is not mounted
 .
   [ Tyler Hicks ]
   * src/utils/ecryptfs-migrate-home: LP: #1026180
     - Correct minor misspelling
   * src/utils/ecryptfs-recover-private: LP: #1004082
     - Fix option parsing when --rw is specified
   * src/utils/ecryptfs-recover-private: LP: #1028923
     - Simplify success message to prevent incorrectly reporting that a
       read-only mount was performed when the --rw option is specified
   * tests/lib/etl_func.sh:
     - Add test library function to return a lower path from an upper path,
       based on inode numbers
   * tests/kernel/mmap-close.sh, tests/kernel/mmap-close/test.c:
     - Add regression test for open->mmap()->close()->dirty memory->munmap()
       pattern
   * tests/kernel/lp-561129.sh:
     - Add test for checking that a pre-existing target inode is properly
       evicted after a rename
   * tests/README:
     - Add documentation on the steps to take when adding new test cases
 .
   [ Colin King ]
   * tests/kernel/lp-911507.sh:
     - Add test case for initializing empty lower files during open()
   * tests/kernel/lp-872905.sh:
     - Add test case to check for proper unlinking of lower files when
       lower file initialization fails
   * src/key_mod/ecryptfs_key_mod_openssl.c,
     src/key_mod/ecryptfs_key_mod_pkcs11_helper.c,
     src/libecryptfs/key_management.c,
     src/utils/mount.ecryptfs_private.c, src/utils/umount.ecryptfs.c:
     - address some issues raised by smatch static analysis
     - fix some memory leaks with frees
     - fix some pointer refs and derefs
     - fix some comment typos
 .
   [ Dustin Kirkland ]
   * src/libecryptfs/key_management.c:
     - silence pam error message when errno == EACCES
       + "Error attempting to parse .ecryptfsrc file; rc = [-13]"
   * src/utils/mount.ecryptfs_private.c: LP: #1052038
     - fix race condition, which typically manifests itself with a user
       saying that their home directory is not accessible, or that their
       filenames are not decrypted
     - the root of the problem is that we were reading the signature file,
       ~/.ecryptfs/Private.sig, twice; in some cases, the first one succeeds,
       so the file encryption signature is read and key is loaded, but then
       some other process (usually from PAM, perhaps a cron job or a
       subsequent login) mounts the home directory before the filename
       encryption key is loaded;  thus, $HOME is mounted but filenames are
       not decrypted, so the second read of ~/.ecryptfs/Private.sig fails
       as that file is not found
     - the solution is to rework the internal fetch_sig() function and read
       one or both signatures within a single open/read/close operation of
       the file
     - free memory used by char **sig on failure
   * debian/copyright:
     - fix lintian warning
   * precise
Checksums-Sha1: 
 3649fadbd586c347d4c815c185305c52e9291f76 2327 ecryptfs-utils_101-0ubuntu1.dsc
 d58242833192328fd32062a9d1611b3b21481993 619606 ecryptfs-utils_101.orig.tar.gz
 ed756d03a2838794fbebb2315ecbacd4f7e3ed16 24112 ecryptfs-utils_101-0ubuntu1.debian.tar.gz
Checksums-Sha256: 
 21b8c24d58c01612c0d4baa7bbb9aab31a2ff69d95dee52874d58c6db28dd593 2327 ecryptfs-utils_101-0ubuntu1.dsc
 f8ddd2be2e208fb2f11aeca1721135c3c31465f78f2318981df682741ac72c55 619606 ecryptfs-utils_101.orig.tar.gz
 626677f7328047a1450874d8369441ebaddb6c2c9854e8060dbd988716a4779f 24112 ecryptfs-utils_101-0ubuntu1.debian.tar.gz
Files: 
 3af15a7350b9c54c3359df45f2c0e1a4 2327 misc optional ecryptfs-utils_101-0ubuntu1.dsc
 7a17714b2e4555a79d464e260b179f4f 619606 misc optional ecryptfs-utils_101.orig.tar.gz
 a32a1ed500c71c6d4d670fe22fcc7e14 24112 misc optional ecryptfs-utils_101-0ubuntu1.debian.tar.gz
Original-Maintainer: Daniel Baumann <daniel at debian.org>


More information about the Raring-changes mailing list