-
ecryptfs-utils (83-0ubuntu3.2.10.04.6) lucid-security; urgency=medium
* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
- src/libecryptfs/key_management.c, src/include/ecryptfs.h: Generate a
random salt when wrapping the mount passphrase.
- src/pam_ecryptfs/pam_ecryptfs.c: If a user has a mount passphrase that was
wrapped using the default salt, their mount passphrase will be rewrapped
using a random salt when they log in with their password.
- src/libecryptfs/key_management.c: Create a temporary file when creating
a new wrapped-passphrase file and copy it to its final destination after
the file has been fully synced to disk (LP: #1020902)
- CVE-2014-9687
-- Tyler Hicks <email address hidden> Wed, 04 Mar 2015 16:26:45 -0600
-
ecryptfs-utils (83-0ubuntu3.2.10.04.3) lucid-proposed; urgency=low
* src/libecryptfs/key_management.c: LP: #725862
- fix nasty bug affecting users who do *not* encrypt filenames;
the first login works, but on logout, only one key gets
cleaned out; subsequent logins do not insert the necessary key
due to an early "goto out"
-- Dustin Kirkland <email address hidden> Fri, 02 Sep 2011 17:47:02 -0500
-
ecryptfs-utils (83-0ubuntu3.2.10.04.2) lucid-security; urgency=low
* SECURITY UPDATE: wrong mtab ownership and permissions (LP: #830850)
- src/utils/mount.ecryptfs_private.c: also set gid and umask before
updating mtab.
- CVE-2011-3145
-- Marc Deslauriers <email address hidden> Mon, 22 Aug 2011 15:44:59 -0400
-
ecryptfs-utils (83-0ubuntu3.2.10.04.1) lucid-security; urgency=low
* SECURITY UPDATE: privilege escalation via mountpoint race conditions
(LP: #732628)
- src/utils/mount.ecryptfs_private.c: chdir into mountpoint before
checking permissions. Patch thanks to Dan Rosenberg.
- CVE-2011-1831
- CVE-2011-1832
* SECURITY UPDATE: race condition when checking source during mount
(LP: #732628)
- src/utils/mount.ecryptfs_private.c: use new ecryptfs_check_dev_ruid
kernel option when mounting directory.
- CVE-2011-1833
* SECURITY UPDATE: mtab corruption via improper handling (LP: #732628)
- src/utils/mount.ecryptfs_private.c: modify mtab via a temp file first
and make sure it succeeds before replacing the real mtab. Patch
thanks to Dan Rosenberg.
- CVE-2011-1834
* SECURITY UPDATE: key poisoning via insecure temp directory handling
(LP: #732628)
- src/utils/ecryptfs-setup-private: make sure we don't copy into a
user controlled directory.
- CVE-2011-1835
* SECURITY UPDATE: arbitrary file overwrite via lock counter race
condition (LP: #732628)
- src/utils/mount.ecryptfs_private.c: verify permissions with a file
descriptor, and don't follow symlinks.
- CVE-2011-1837
-- Marc Deslauriers <email address hidden> Thu, 04 Aug 2011 10:37:00 -0400
-
ecryptfs-utils (83-0ubuntu3.1) lucid-proposed; urgency=low
* Cherry pick upstream bzr commit r520
* src/utils/mount.ecryptfs_private.c:
- fix bug LP: #313812, clear used keys on unmount
- add ecryptfs_unlink_sigs to the mount opts, so that unmounts from
umount.ecryptfs behave similarly
- use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek
-- Dustin Kirkland <email address hidden> Fri, 11 Feb 2011 17:21:59 -0600
-
ecryptfs-utils (83-0ubuntu3) lucid; urgency=low
* src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139
-- Dustin Kirkland <email address hidden> Thu, 18 Feb 2010 18:07:48 -0600
-
ecryptfs-utils (83-0ubuntu2) lucid; urgency=low
* debian/rules, debian/control: disable the gpg key module,
as it's not yet functional; does more harm than good to build it;
should not be in 10.04 LTS; clean up build-deps; also, not using
opencryptoki either; unbreak the build for 32-bit Lucid
-- Dustin Kirkland <email address hidden> Wed, 17 Feb 2010 16:20:35 -0600
-
ecryptfs-utils (83-0ubuntu1) lucid; urgency=low
[ David Planella ]
* Makefile.am, configure.ac, debian/control, debian/po/POTFILES.sh,
debian/po/ecryptfs-utils.pot, debian/po/fr.po, debian/rules,
po/POTFILES.in, src/desktop/Makefile.am,
src/desktop/ecryptfs-mount-private.desktop,
src/desktop/ecryptfs-mount-private.desktop.in,
src/desktop/ecryptfs-record-passphrase,
src/desktop/ecryptfs-setup-private.desktop,
src/desktop/ecryptfs-setup-private.desktop.in:
- internationalization work for LP: #358283
* po/LINGUAS, po/ca.po: Catalan translation
[ Yan Li <email address hidden> ]
* src/pam_ecryptfs/pam_ecryptfs.c, src/utils/Makefile.am,
src/utils/ecryptfs-migrate-home: add a script and pam hooks to
support automatic migration to encrypted home directory
[ Dustin Kirkland ]
* src/utils/ecryptfs-migrate-home: clean up for merge
- use $() rather than ``
- drop set -u
- use = and !=, and quote vars, rather than testing with -ne, -eq,
for better shell portability
- improve usage statement and error text
- check if already encrypted
- handle migration of multiple users on boot
- fix all whitespace, use tabs for indents
- use quotes around variables, rather than ${} (stylistic preference)
- major simplification for immediate release
+ remove boot and user modes; only support administrator mode for
security reasons and to avoid race conditions
+ other modes can be re-added, if necessary, and if security
concerns can be addressed
- ensure running as root
- drop VERBOSE option, always print useful info messages
- call the user $USER_NAME rather than $USER_ID since id implies
number, and here we're deailing with names
- no decimals on awk calculation
- mktemp on the target user, not root
- check that there is enough disk space available to do the migration
- ensure the user's homedir group is correct
- add critical instructions, user *must* login after the migration and
before the reboot, as their wrapped passphrase will be cleared on
reboot (possible we should use an init script to move these to
/var/tmp on reboot)
- ensure permissions are set correctly
- improve text at the end of the migration, organize into notes
* ecryptfs-utils.ecryptfs-utils-restore.upstart,
ecryptfs-utils.ecryptfs-utils-save.upstart, rules:
- try to protect migrating users who don't login before the next reboot
* debian/ecryptfs-utils.install: install the locale messages
* src/desktop/ecryptfs-record-passphrase: improve dialog text
* src/desktop/ecryptfs-record-passphrase: revert the _ bit, as it's not quite
working yet, will need to talk to David to fix
* Mark LP: #471725 as fixed
-- Dustin Kirkland <email address hidden> Wed, 17 Feb 2010 15:17:09 -0600
-
ecryptfs-utils (82-0ubuntu2) lucid; urgency=low
* debian/rules: fix FTBFS, CFLAGS needed for libgcrypt11-dev linking
-- Dustin Kirkland <email address hidden> Tue, 10 Nov 2009 12:05:58 -0600
-
ecryptfs-utils (82-0ubuntu1) lucid; urgency=low
* Merging upstream release
-- Dustin Kirkland <email address hidden> Tue, 10 Nov 2009 11:36:15 -0600
-
ecryptfs-utils (81-0ubuntu3) karmic; urgency=low
* src/utils/ecryptfs-setup-private, debian/control: LP: #456565
- fix typo, s/getext/gettext
- depend on gettext-base
-- Dustin Kirkland <email address hidden> Tue, 20 Oct 2009 13:42:43 -0500