[ubuntu/trusty-proposed] ecryptfs-utils 104-0ubuntu1 (Accepted)
Nobuto MURATA
nobuto at ubuntu.com
Thu Jan 23 22:50:15 UTC 2014
ecryptfs-utils (104-0ubuntu1) trusty; urgency=low
[ Colin King ]
* src/libecryptfs/ecryptfs-stat.c, tests/kernel/extend-file-
random/test.c, tests/kernel/inode-race-stat/test.c,
tests/kernel/trunc-file/test.c:
- Fixed some 32 bit build warnings
* src/libecryptfs/decision_graph.c, src/libecryptfs/key_management.c,
src/libecryptfs/main.c, src/libecryptfs/module_mgr.c, src/utils/io.c,
src/utils/mount.ecryptfs_private.c, tests/kernel/inotify/test.c,
tests/kernel/trunc-file/test.c, tests/userspace/wrap-unwrap/test.c:
- Fixed a pile of minor bugs (memory leaks, unclosed file descriptors,
etc.) mostly in error paths
* src/key_mod/ecryptfs_key_mod_passphrase.c, src/libecryptfs/main.c,
src/pam_ecryptfs/pam_ecryptfs.c:
- more Coverity fixes, memory leak, error checking, etc.
[ Nobuto MURATA ]
* fix an empty update-notifier window (LP: #1107650)
- changes made in Rev.758 was incomplete
[ Tyler Hicks ]
* doc/manpage/ecryptfs.7:
- adjust man page text to avoid confusion about whether the interactive
mount helper takes a capital 'N' for the answer to y/n questions
(LP: #1130460)
* src/utils/ecryptfs_rewrap_passphrase.c:
- Handle errors when interactively reading the new wrapping passphrase
and the confirmation from stdin. Fixes a segfault (invalid memory read)
in ecryptfs-rewrap-passphrase if there was an error while reading either
of these passphrases.
* configure.ac:
- Set AM_CPPFLAGS to always include config.h as the first include file.
Some .c files correctly included config.h before anything else. The
majority of .c files got this wrong by including it after other header
files, including it multiple times, or not including it at all.
Including it in the AM_CPPFLAGS should solve these problems and keep
future mistakes from happening in new source files.
- Enable large file support (LFS) through the use of the AC_SYS_LARGEFILE
autoconf macro. ecryptfs-utils has been well tested with LFS enabled
because ecryptfs-utils is being built with
'-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' in Debian-based distros.
This is mainly needed for some of the in-tree regression tests but
ecryptfs-utils, in general, should be built with LFS enabled.
* debian/rules:
- Don't append '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' to the CFLAGS
now that the upstream build enables LFS
* tests/userspace/lfs.sh, tests/userspace/lfs/test.c:
- Add a test to verify that LFS is enabled. This test is run under the
make check target.
* tests/kernel/enospc/test.c:
- Fix test failures on 32 bit architectures due to large file sizes
overflowing data types
[ Dustin Kirkland ]
* src/utils/ecryptfs-setup-swap: LP: #1172014
- write crypttab entry using UUID
* src/utils/ecryptfs-recover-private: LP: #1028532
- error out, if we fail to mount the private data correctly
[ Colin King and Dustin Kirkland ]
* configure.ac, src/daemon/main.c, src/libecryptfs/cmd_ln_parser.c,
src/libecryptfs/decision_graph.c, src/utils/mount.ecryptfs.c,
tests/kernel/trunc-file/test.c:
- remove some dead code, fix some minor issues raised by Coverity
Date: Thu, 21 Feb 2013 01:56:33 +0900
Changed-By: Nobuto MURATA <nobuto at ubuntu.com>
Maintainer: Dustin Kirkland <kirkland at ubuntu.com>
Signed-By: =?utf-8?q?Dustin_Kirkland_=EE=83=BF?= <dustin.kirkland at gmail.com>
https://launchpad.net/ubuntu/trusty/+source/ecryptfs-utils/104-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 21 Feb 2013 01:56:33 +0900
Source: ecryptfs-utils
Binary: ecryptfs-utils ecryptfs-utils-dbg libecryptfs0 libecryptfs-dev python-ecryptfs
Architecture: source
Version: 104-0ubuntu1
Distribution: trusty
Urgency: low
Maintainer: Dustin Kirkland <kirkland at ubuntu.com>
Changed-By: Nobuto MURATA <nobuto at ubuntu.com>
Description:
ecryptfs-utils - ecryptfs cryptographic filesystem (utilities)
ecryptfs-utils-dbg - ecryptfs cryptographic filesystem (utilities; debug)
libecryptfs-dev - ecryptfs cryptographic filesystem (development)
libecryptfs0 - ecryptfs cryptographic filesystem (library)
python-ecryptfs - ecryptfs cryptographic filesystem (python)
Launchpad-Bugs-Fixed: 1028532 1107650 1130460 1172014
Changes:
ecryptfs-utils (104-0ubuntu1) trusty; urgency=low
.
[ Colin King ]
* src/libecryptfs/ecryptfs-stat.c, tests/kernel/extend-file-
random/test.c, tests/kernel/inode-race-stat/test.c,
tests/kernel/trunc-file/test.c:
- Fixed some 32 bit build warnings
* src/libecryptfs/decision_graph.c, src/libecryptfs/key_management.c,
src/libecryptfs/main.c, src/libecryptfs/module_mgr.c, src/utils/io.c,
src/utils/mount.ecryptfs_private.c, tests/kernel/inotify/test.c,
tests/kernel/trunc-file/test.c, tests/userspace/wrap-unwrap/test.c:
- Fixed a pile of minor bugs (memory leaks, unclosed file descriptors,
etc.) mostly in error paths
* src/key_mod/ecryptfs_key_mod_passphrase.c, src/libecryptfs/main.c,
src/pam_ecryptfs/pam_ecryptfs.c:
- more Coverity fixes, memory leak, error checking, etc.
.
[ Nobuto MURATA ]
* fix an empty update-notifier window (LP: #1107650)
- changes made in Rev.758 was incomplete
.
[ Tyler Hicks ]
* doc/manpage/ecryptfs.7:
- adjust man page text to avoid confusion about whether the interactive
mount helper takes a capital 'N' for the answer to y/n questions
(LP: #1130460)
* src/utils/ecryptfs_rewrap_passphrase.c:
- Handle errors when interactively reading the new wrapping passphrase
and the confirmation from stdin. Fixes a segfault (invalid memory read)
in ecryptfs-rewrap-passphrase if there was an error while reading either
of these passphrases.
* configure.ac:
- Set AM_CPPFLAGS to always include config.h as the first include file.
Some .c files correctly included config.h before anything else. The
majority of .c files got this wrong by including it after other header
files, including it multiple times, or not including it at all.
Including it in the AM_CPPFLAGS should solve these problems and keep
future mistakes from happening in new source files.
- Enable large file support (LFS) through the use of the AC_SYS_LARGEFILE
autoconf macro. ecryptfs-utils has been well tested with LFS enabled
because ecryptfs-utils is being built with
'-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' in Debian-based distros.
This is mainly needed for some of the in-tree regression tests but
ecryptfs-utils, in general, should be built with LFS enabled.
* debian/rules:
- Don't append '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' to the CFLAGS
now that the upstream build enables LFS
* tests/userspace/lfs.sh, tests/userspace/lfs/test.c:
- Add a test to verify that LFS is enabled. This test is run under the
make check target.
* tests/kernel/enospc/test.c:
- Fix test failures on 32 bit architectures due to large file sizes
overflowing data types
.
[ Dustin Kirkland ]
* src/utils/ecryptfs-setup-swap: LP: #1172014
- write crypttab entry using UUID
* src/utils/ecryptfs-recover-private: LP: #1028532
- error out, if we fail to mount the private data correctly
.
[ Colin King and Dustin Kirkland ]
* configure.ac, src/daemon/main.c, src/libecryptfs/cmd_ln_parser.c,
src/libecryptfs/decision_graph.c, src/utils/mount.ecryptfs.c,
tests/kernel/trunc-file/test.c:
- remove some dead code, fix some minor issues raised by Coverity
Checksums-Sha1:
6d116ac3939acc5611eb1729a009563bff348052 2298 ecryptfs-utils_104-0ubuntu1.dsc
f23f17703c9f34859a9bc3edbecb524c3edd564a 648617 ecryptfs-utils_104.orig.tar.gz
dcf5c05d01d2647d4118f59ec01748cc755cc6de 26612 ecryptfs-utils_104-0ubuntu1.debian.tar.gz
Checksums-Sha256:
87205d46b3fdbf55ff58b97f60b45830fbcbc676b6c31d0b2184786610b121d8 2298 ecryptfs-utils_104-0ubuntu1.dsc
caf28f588627ca4ca2033f5e5d44d8395bf0fc17d47977f6ee446a01c74468ec 648617 ecryptfs-utils_104.orig.tar.gz
40a0ea2f5757d9205f60e24928b276701170694a03dc37323f3a51951dabc385 26612 ecryptfs-utils_104-0ubuntu1.debian.tar.gz
Files:
47537765347398c80a399e1d3aa29d45 2298 misc optional ecryptfs-utils_104-0ubuntu1.dsc
5a041b78718145f14f5d5f25df0b9bf5 648617 misc optional ecryptfs-utils_104.orig.tar.gz
282d837839b893084bb637ca477bbe33 26612 misc optional ecryptfs-utils_104-0ubuntu1.debian.tar.gz
Original-Maintainer: Daniel Baumann <daniel at debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)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=IXMi
-----END PGP SIGNATURE-----
More information about the Trusty-changes
mailing list