[ubuntu/raring-proposed] ecryptfs-utils 101-0ubuntu1 (Accepted)
Dustin Kirkland
kirkland at ubuntu.com
Sun Oct 28 20:56:24 UTC 2012
ecryptfs-utils (101-0ubuntu1) raring; urgency=low
[ Eric Lammerts ]
* src/libecryptfs/sysfs.c: LP: #1007880
- Handle NULL mnt pointer when sysfs is not mounted
[ Tyler Hicks ]
* src/utils/ecryptfs-migrate-home: LP: #1026180
- Correct minor misspelling
* src/utils/ecryptfs-recover-private: LP: #1004082
- Fix option parsing when --rw is specified
* src/utils/ecryptfs-recover-private: LP: #1028923
- Simplify success message to prevent incorrectly reporting that a
read-only mount was performed when the --rw option is specified
* tests/lib/etl_func.sh:
- Add test library function to return a lower path from an upper path,
based on inode numbers
* tests/kernel/mmap-close.sh, tests/kernel/mmap-close/test.c:
- Add regression test for open->mmap()->close()->dirty memory->munmap()
pattern
* tests/kernel/lp-561129.sh:
- Add test for checking that a pre-existing target inode is properly
evicted after a rename
* tests/README:
- Add documentation on the steps to take when adding new test cases
[ Colin King ]
* tests/kernel/lp-911507.sh:
- Add test case for initializing empty lower files during open()
* tests/kernel/lp-872905.sh:
- Add test case to check for proper unlinking of lower files when
lower file initialization fails
* src/key_mod/ecryptfs_key_mod_openssl.c,
src/key_mod/ecryptfs_key_mod_pkcs11_helper.c,
src/libecryptfs/key_management.c,
src/utils/mount.ecryptfs_private.c, src/utils/umount.ecryptfs.c:
- address some issues raised by smatch static analysis
- fix some memory leaks with frees
- fix some pointer refs and derefs
- fix some comment typos
[ Dustin Kirkland ]
* src/libecryptfs/key_management.c:
- silence pam error message when errno == EACCES
+ "Error attempting to parse .ecryptfsrc file; rc = [-13]"
* src/utils/mount.ecryptfs_private.c: LP: #1052038
- fix race condition, which typically manifests itself with a user
saying that their home directory is not accessible, or that their
filenames are not decrypted
- the root of the problem is that we were reading the signature file,
~/.ecryptfs/Private.sig, twice; in some cases, the first one succeeds,
so the file encryption signature is read and key is loaded, but then
some other process (usually from PAM, perhaps a cron job or a
subsequent login) mounts the home directory before the filename
encryption key is loaded; thus, $HOME is mounted but filenames are
not decrypted, so the second read of ~/.ecryptfs/Private.sig fails
as that file is not found
- the solution is to rework the internal fetch_sig() function and read
one or both signatures within a single open/read/close operation of
the file
- free memory used by char **sig on failure
* debian/copyright:
- fix lintian warning
* precise
Date: Thu, 25 Oct 2012 16:13:28 -0500
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
Signed-By: Adam Conrad <adconrad at 0c3.net>
https://launchpad.net/ubuntu/raring/+source/ecryptfs-utils/101-0ubuntu1
-------------- next part --------------
Format: 1.8
Date: Thu, 25 Oct 2012 16:13:28 -0500
Source: ecryptfs-utils
Binary: ecryptfs-utils ecryptfs-utils-dbg libecryptfs0 libecryptfs-dev python-ecryptfs
Architecture: source
Version: 101-0ubuntu1
Distribution: raring
Urgency: low
Maintainer: Dustin Kirkland <kirkland at ubuntu.com>
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
Description:
ecryptfs-utils - ecryptfs cryptographic filesystem (utilities)
ecryptfs-utils-dbg - ecryptfs cryptographic filesystem (utilities; debug)
libecryptfs-dev - ecryptfs cryptographic filesystem (development)
libecryptfs0 - ecryptfs cryptographic filesystem (library)
python-ecryptfs - ecryptfs cryptographic filesystem (python)
Launchpad-Bugs-Fixed: 1004082 1007880 1026180 1028923 1052038
Changes:
ecryptfs-utils (101-0ubuntu1) raring; urgency=low
.
[ Eric Lammerts ]
* src/libecryptfs/sysfs.c: LP: #1007880
- Handle NULL mnt pointer when sysfs is not mounted
.
[ Tyler Hicks ]
* src/utils/ecryptfs-migrate-home: LP: #1026180
- Correct minor misspelling
* src/utils/ecryptfs-recover-private: LP: #1004082
- Fix option parsing when --rw is specified
* src/utils/ecryptfs-recover-private: LP: #1028923
- Simplify success message to prevent incorrectly reporting that a
read-only mount was performed when the --rw option is specified
* tests/lib/etl_func.sh:
- Add test library function to return a lower path from an upper path,
based on inode numbers
* tests/kernel/mmap-close.sh, tests/kernel/mmap-close/test.c:
- Add regression test for open->mmap()->close()->dirty memory->munmap()
pattern
* tests/kernel/lp-561129.sh:
- Add test for checking that a pre-existing target inode is properly
evicted after a rename
* tests/README:
- Add documentation on the steps to take when adding new test cases
.
[ Colin King ]
* tests/kernel/lp-911507.sh:
- Add test case for initializing empty lower files during open()
* tests/kernel/lp-872905.sh:
- Add test case to check for proper unlinking of lower files when
lower file initialization fails
* src/key_mod/ecryptfs_key_mod_openssl.c,
src/key_mod/ecryptfs_key_mod_pkcs11_helper.c,
src/libecryptfs/key_management.c,
src/utils/mount.ecryptfs_private.c, src/utils/umount.ecryptfs.c:
- address some issues raised by smatch static analysis
- fix some memory leaks with frees
- fix some pointer refs and derefs
- fix some comment typos
.
[ Dustin Kirkland ]
* src/libecryptfs/key_management.c:
- silence pam error message when errno == EACCES
+ "Error attempting to parse .ecryptfsrc file; rc = [-13]"
* src/utils/mount.ecryptfs_private.c: LP: #1052038
- fix race condition, which typically manifests itself with a user
saying that their home directory is not accessible, or that their
filenames are not decrypted
- the root of the problem is that we were reading the signature file,
~/.ecryptfs/Private.sig, twice; in some cases, the first one succeeds,
so the file encryption signature is read and key is loaded, but then
some other process (usually from PAM, perhaps a cron job or a
subsequent login) mounts the home directory before the filename
encryption key is loaded; thus, $HOME is mounted but filenames are
not decrypted, so the second read of ~/.ecryptfs/Private.sig fails
as that file is not found
- the solution is to rework the internal fetch_sig() function and read
one or both signatures within a single open/read/close operation of
the file
- free memory used by char **sig on failure
* debian/copyright:
- fix lintian warning
* precise
Checksums-Sha1:
3649fadbd586c347d4c815c185305c52e9291f76 2327 ecryptfs-utils_101-0ubuntu1.dsc
d58242833192328fd32062a9d1611b3b21481993 619606 ecryptfs-utils_101.orig.tar.gz
ed756d03a2838794fbebb2315ecbacd4f7e3ed16 24112 ecryptfs-utils_101-0ubuntu1.debian.tar.gz
Checksums-Sha256:
21b8c24d58c01612c0d4baa7bbb9aab31a2ff69d95dee52874d58c6db28dd593 2327 ecryptfs-utils_101-0ubuntu1.dsc
f8ddd2be2e208fb2f11aeca1721135c3c31465f78f2318981df682741ac72c55 619606 ecryptfs-utils_101.orig.tar.gz
626677f7328047a1450874d8369441ebaddb6c2c9854e8060dbd988716a4779f 24112 ecryptfs-utils_101-0ubuntu1.debian.tar.gz
Files:
3af15a7350b9c54c3359df45f2c0e1a4 2327 misc optional ecryptfs-utils_101-0ubuntu1.dsc
7a17714b2e4555a79d464e260b179f4f 619606 misc optional ecryptfs-utils_101.orig.tar.gz
a32a1ed500c71c6d4d670fe22fcc7e14 24112 misc optional ecryptfs-utils_101-0ubuntu1.debian.tar.gz
Original-Maintainer: Daniel Baumann <daniel at debian.org>
More information about the Raring-changes
mailing list