View Git repositories
Name Status Last Modified Last Commit
lp:ubuntu/wily-proposed/ecryptfs-utils bug 1 Development 2015-08-06 18:13:00 UTC
50. [ Martin Pitt ] * src/utils/ecryptfs-...

Author: Dustin Kirkland 
Revision Date: 2015-08-06 12:46:37 UTC

[ Martin Pitt ]
* src/utils/ecryptfs-setup-swap:
  - Add setup-swap-check-links.patch: When commenting out existing swap, also
    consider device symlinks like /dev/mapper/ubuntu--vg-swap_1 or
    /dev/disks/by-uuid/ into account. Fixes broken cryptswap under LVM and
    manual setups. (LP: #1453738)
* src/utils/ecryptfs-setup-swap, debian/ecryptfs-utils.postinst:
  - On upgrade, uncomment underlying
    unencrypted swap partitions that are referred to by a device link when
    crypttab and fstab have a "cryptswap*" device referring to them.
* debian/control, debian/libecryptfs0.install,
  debian/libecryptfs0.links, debian/libecryptfs0.shlibs:
  - Rename libecryptfs0 to libecryptfs1 and adjust the packaging. It has
    actually shipped libecryptfs.so.1 since at least trusty. Add
    C/R/P: libecryptfs0 for smoother upgrades, this needs to be kept until
    after 16.04 LTS.

[ Tyler Hicks ]
* src/utils/mount.ecryptfs_private.c: Implement proper option parsing to
  restore the -f option when unmounting and display a helpful usage message
  (LP: #1454388)
* src/utils/mount.ecryptfs_private.c: Add an option, -d, to
  umount.ecryptfs_private to treat the situation where the encrypted private
  session counter is nonzero, after decrementing it, as a non-error
  situation. No error message is printed to stderr and the exit status is 0.
* src/pam_ecryptfs/pam_ecryptfs.c: Use the new umount.ecryptfs_private '-d'
  option to silence the error message that was printed to stderr when the
  encrypted private session counter is nonzero after being decremented.
  (LP: #1454319)
* src/utils/ecryptfs-umount-private: Return 1 if umount.ecryptfs_private
  encounters an error. The ecryptfs-umount-private script was previously
  returning 0 even when umount.ecryptfs_private exited upon error.
* debian/control: Fix 'Please add dh-python package to Build-Depends'
  build warning

[ Dustin Kirkland ]
* debian/libecryptfs1.install, debian/libecryptfs1.links,
  debian/libecryptfs1.shlibs:
  - fix ftbfs, add missing files
* wily

lp:ubuntu/wily/ecryptfs-utils bug 1 Development 2015-08-06 12:46:37 UTC
50. [ Martin Pitt ] * src/utils/ecryptfs-...

Author: Dustin Kirkland 
Revision Date: 2015-08-06 12:46:37 UTC

[ Martin Pitt ]
* src/utils/ecryptfs-setup-swap:
  - Add setup-swap-check-links.patch: When commenting out existing swap, also
    consider device symlinks like /dev/mapper/ubuntu--vg-swap_1 or
    /dev/disks/by-uuid/ into account. Fixes broken cryptswap under LVM and
    manual setups. (LP: #1453738)
* src/utils/ecryptfs-setup-swap, debian/ecryptfs-utils.postinst:
  - On upgrade, uncomment underlying
    unencrypted swap partitions that are referred to by a device link when
    crypttab and fstab have a "cryptswap*" device referring to them.
* debian/control, debian/libecryptfs0.install,
  debian/libecryptfs0.links, debian/libecryptfs0.shlibs:
  - Rename libecryptfs0 to libecryptfs1 and adjust the packaging. It has
    actually shipped libecryptfs.so.1 since at least trusty. Add
    C/R/P: libecryptfs0 for smoother upgrades, this needs to be kept until
    after 16.04 LTS.

[ Tyler Hicks ]
* src/utils/mount.ecryptfs_private.c: Implement proper option parsing to
  restore the -f option when unmounting and display a helpful usage message
  (LP: #1454388)
* src/utils/mount.ecryptfs_private.c: Add an option, -d, to
  umount.ecryptfs_private to treat the situation where the encrypted private
  session counter is nonzero, after decrementing it, as a non-error
  situation. No error message is printed to stderr and the exit status is 0.
* src/pam_ecryptfs/pam_ecryptfs.c: Use the new umount.ecryptfs_private '-d'
  option to silence the error message that was printed to stderr when the
  encrypted private session counter is nonzero after being decremented.
  (LP: #1454319)
* src/utils/ecryptfs-umount-private: Return 1 if umount.ecryptfs_private
  encounters an error. The ecryptfs-umount-private script was previously
  returning 0 even when umount.ecryptfs_private exited upon error.
* debian/control: Fix 'Please add dh-python package to Build-Depends'
  build warning

[ Dustin Kirkland ]
* debian/libecryptfs1.install, debian/libecryptfs1.links,
  debian/libecryptfs1.shlibs:
  - fix ftbfs, add missing files
* wily

lp:ubuntu/vivid-proposed/ecryptfs-utils bug 1 Development 2015-07-15 19:49:11 UTC
48. * Add setup-swap-check-links.patch: W...

Author: Martin Pitt
Revision Date: 2015-07-09 09:04:27 UTC

* Add setup-swap-check-links.patch: When commenting out existing swap, also
  consider device symlinks like /dev/mapper/ubuntu--vg-swap_1 or
  /dev/disks/by-uuid/ into account. Fixes broken cryptswap under LVM and
  manual setups. (LP: #1453738)
* debian/ecryptfs-utils.postinst: On upgrade, uncomment underlying
  unencrypted swap partitions that are referred to by a device link when
  crypttab and fstab have a "cryptswap*" device referring to them.

lp:ubuntu/vivid-updates/ecryptfs-utils 2 Mature 2015-07-09 09:04:27 UTC
48. * Add setup-swap-check-links.patch: W...

Author: Martin Pitt
Revision Date: 2015-07-09 09:04:27 UTC

* Add setup-swap-check-links.patch: When commenting out existing swap, also
  consider device symlinks like /dev/mapper/ubuntu--vg-swap_1 or
  /dev/disks/by-uuid/ into account. Fixes broken cryptswap under LVM and
  manual setups. (LP: #1453738)
* debian/ecryptfs-utils.postinst: On upgrade, uncomment underlying
  unencrypted swap partitions that are referred to by a device link when
  crypttab and fstab have a "cryptswap*" device referring to them.

lp:ubuntu/vivid/ecryptfs-utils bug 2 Mature 2015-03-26 18:02:29 UTC
46. [ Dustin Kirkland ] * scripts/release...

Author: Dustin Kirkland 
Revision Date: 2015-03-26 18:02:29 UTC

[ Dustin Kirkland ]
* scripts/release.sh:
  - a few more release script improvements, build the source
    package for the Ubuntu development distro
* debian/control:
  - build depend on distro-info, which we use in our release script
* vivid

[ Tyler Hicks ]
* src/libecryptfs/key_management.c:
  - Fix a regression when reading version 1 wrapped passphrase files. A
    return code indicating success was always returned even when an error
    was encountered. The impact is low since the error situation is still
    caught when validating either the wrapping password's signature or the
    wrapped passphrase's signature. Thanks to László Böszörményi for
    catching this mistake.
  - Reject empty passphrases passed into ecryptfs_wrap_passphrase()
* src/libecryptfs/main.c:
  - Reject empty wrapping passphrases passed into generate_passphrase_sig()

lp:ubuntu/utopic-updates/ecryptfs-utils 2 Mature 2015-03-11 01:09:54 UTC
45. * SECURITY UPDATE: Mount passphrase w...

Author: Tyler Hicks
Revision Date: 2015-03-04 16:40:18 UTC

* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
  - debian/patches/CVE-2014-9687.patch: Generate a random salt when wrapping
    the mount passphrase. If a user has a mount passphrase that was wrapped
    using the default salt, their mount passphrase will be rewrapped using a
    random salt when they log in with their password.
  - debian/patches/CVE-2014-9687.patch: Create a temporary file when
    creating a new wrapped-passphrase file and copy it to its final
    destination after the file has been fully synced to disk (LP: #1020902)
  - debian/rules: Set the executable bit on the
    v1-to-v2-wrapped-passphrase.sh test script that was created by
    wrapping-passphrase-salt.patch
  - CVE-2014-9687

lp:ubuntu/trusty-updates/ecryptfs-utils 2 Mature 2015-03-11 01:09:48 UTC
94. * SECURITY UPDATE: Mount passphrase w...

Author: Tyler Hicks
Revision Date: 2015-03-04 16:39:28 UTC

* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
  - debian/patches/CVE-2014-9687.patch: Generate a random salt when wrapping
    the mount passphrase. If a user has a mount passphrase that was wrapped
    using the default salt, their mount passphrase will be rewrapped using a
    random salt when they log in with their password.
  - debian/patches/CVE-2014-9687.patch: Create a temporary file when
    creating a new wrapped-passphrase file and copy it to its final
    destination after the file has been fully synced to disk (LP: #1020902)
  - debian/rules: Set the executable bit on the
    v1-to-v2-wrapped-passphrase.sh test script that was created by
    wrapping-passphrase-salt.patch
  - CVE-2014-9687

lp:ubuntu/utopic-security/ecryptfs-utils bug 2 Mature 2015-03-11 00:37:22 UTC
45. * SECURITY UPDATE: Mount passphrase w...

Author: Tyler Hicks
Revision Date: 2015-03-04 16:40:18 UTC

* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
  - debian/patches/CVE-2014-9687.patch: Generate a random salt when wrapping
    the mount passphrase. If a user has a mount passphrase that was wrapped
    using the default salt, their mount passphrase will be rewrapped using a
    random salt when they log in with their password.
  - debian/patches/CVE-2014-9687.patch: Create a temporary file when
    creating a new wrapped-passphrase file and copy it to its final
    destination after the file has been fully synced to disk (LP: #1020902)
  - debian/rules: Set the executable bit on the
    v1-to-v2-wrapped-passphrase.sh test script that was created by
    wrapping-passphrase-salt.patch
  - CVE-2014-9687

lp:ubuntu/trusty-security/ecryptfs-utils bug 2 Mature 2015-03-11 00:37:15 UTC
94. * SECURITY UPDATE: Mount passphrase w...

Author: Tyler Hicks
Revision Date: 2015-03-04 16:39:28 UTC

* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
  - debian/patches/CVE-2014-9687.patch: Generate a random salt when wrapping
    the mount passphrase. If a user has a mount passphrase that was wrapped
    using the default salt, their mount passphrase will be rewrapped using a
    random salt when they log in with their password.
  - debian/patches/CVE-2014-9687.patch: Create a temporary file when
    creating a new wrapped-passphrase file and copy it to its final
    destination after the file has been fully synced to disk (LP: #1020902)
  - debian/rules: Set the executable bit on the
    v1-to-v2-wrapped-passphrase.sh test script that was created by
    wrapping-passphrase-salt.patch
  - CVE-2014-9687

lp:ubuntu/precise-security/ecryptfs-utils bug 2 Mature 2015-03-11 00:37:10 UTC
83. * SECURITY UPDATE: Mount passphrase w...

Author: Tyler Hicks
Revision Date: 2015-03-04 16:38:14 UTC

* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
  - debian/patches/CVE-2014-9687.patch: Generate a random salt when wrapping
    the mount passphrase. If a user has a mount passphrase that was wrapped
    using the default salt, their mount passphrase will be rewrapped using a
    random salt when they log in with their password.
  - debian/patches/CVE-2014-9687.patch: Create a temporary file when
    creating a new wrapped-passphrase file and copy it to its final
    destination after the file has been fully synced to disk (LP: #1020902)
  - debian/rules: Set the executable bit on the wrap-unwrap.sh and
    v1-to-v2-wrapped-passphrase.sh test scripts that were created by
    wrapping-passphrase-salt.patch
  - CVE-2014-9687

lp:ubuntu/lucid-security/ecryptfs-utils bug 2 Mature 2015-03-11 00:37:05 UTC
68. * SECURITY UPDATE: Mount passphrase w...

Author: Tyler Hicks
Revision Date: 2015-03-04 16:26:45 UTC

* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
  - src/libecryptfs/key_management.c, src/include/ecryptfs.h: Generate a
    random salt when wrapping the mount passphrase.
  - src/pam_ecryptfs/pam_ecryptfs.c: If a user has a mount passphrase that was
    wrapped using the default salt, their mount passphrase will be rewrapped
    using a random salt when they log in with their password.
  - src/libecryptfs/key_management.c: Create a temporary file when creating
    a new wrapped-passphrase file and copy it to its final destination after
    the file has been fully synced to disk (LP: #1020902)
  - CVE-2014-9687

lp:ubuntu/precise-updates/ecryptfs-utils 2 Mature 2015-03-04 16:38:14 UTC
83. * SECURITY UPDATE: Mount passphrase w...

Author: Tyler Hicks
Revision Date: 2015-03-04 16:38:14 UTC

* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
  - debian/patches/CVE-2014-9687.patch: Generate a random salt when wrapping
    the mount passphrase. If a user has a mount passphrase that was wrapped
    using the default salt, their mount passphrase will be rewrapped using a
    random salt when they log in with their password.
  - debian/patches/CVE-2014-9687.patch: Create a temporary file when
    creating a new wrapped-passphrase file and copy it to its final
    destination after the file has been fully synced to disk (LP: #1020902)
  - debian/rules: Set the executable bit on the wrap-unwrap.sh and
    v1-to-v2-wrapped-passphrase.sh test scripts that were created by
    wrapping-passphrase-salt.patch
  - CVE-2014-9687

lp:ubuntu/lucid-updates/ecryptfs-utils 2 Mature 2015-03-04 16:26:45 UTC
68. * SECURITY UPDATE: Mount passphrase w...

Author: Tyler Hicks
Revision Date: 2015-03-04 16:26:45 UTC

* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
  - src/libecryptfs/key_management.c, src/include/ecryptfs.h: Generate a
    random salt when wrapping the mount passphrase.
  - src/pam_ecryptfs/pam_ecryptfs.c: If a user has a mount passphrase that was
    wrapped using the default salt, their mount passphrase will be rewrapped
    using a random salt when they log in with their password.
  - src/libecryptfs/key_management.c: Create a temporary file when creating
    a new wrapped-passphrase file and copy it to its final destination after
    the file has been fully synced to disk (LP: #1020902)
  - CVE-2014-9687

lp:ubuntu/utopic/ecryptfs-utils 2 Mature 2014-04-26 14:06:28 UTC
44. [ Colin King ] * src/libecryptfs/ecry...

Author: Nobuto Murata
Revision Date: 2013-02-21 01:56:33 UTC

[ Colin King ]
* src/libecryptfs/ecryptfs-stat.c, tests/kernel/extend-file-
  random/test.c, tests/kernel/inode-race-stat/test.c,
  tests/kernel/trunc-file/test.c:
  - Fixed some 32 bit build warnings
* src/libecryptfs/decision_graph.c, src/libecryptfs/key_management.c,
  src/libecryptfs/main.c, src/libecryptfs/module_mgr.c, src/utils/io.c,
  src/utils/mount.ecryptfs_private.c, tests/kernel/inotify/test.c,
  tests/kernel/trunc-file/test.c, tests/userspace/wrap-unwrap/test.c:
  - Fixed a pile of minor bugs (memory leaks, unclosed file descriptors,
    etc.) mostly in error paths
* src/key_mod/ecryptfs_key_mod_passphrase.c, src/libecryptfs/main.c,
  src/pam_ecryptfs/pam_ecryptfs.c:
  - more Coverity fixes, memory leak, error checking, etc.

[ Nobuto MURATA ]
* fix an empty update-notifier window (LP: #1107650)
  - changes made in Rev.758 was incomplete

[ Tyler Hicks ]
* doc/manpage/ecryptfs.7:
  - adjust man page text to avoid confusion about whether the interactive
    mount helper takes a capital 'N' for the answer to y/n questions
    (LP: #1130460)
* src/utils/ecryptfs_rewrap_passphrase.c:
  - Handle errors when interactively reading the new wrapping passphrase
    and the confirmation from stdin. Fixes a segfault (invalid memory read)
    in ecryptfs-rewrap-passphrase if there was an error while reading either
    of these passphrases.
* configure.ac:
  - Set AM_CPPFLAGS to always include config.h as the first include file.
    Some .c files correctly included config.h before anything else. The
    majority of .c files got this wrong by including it after other header
    files, including it multiple times, or not including it at all.
    Including it in the AM_CPPFLAGS should solve these problems and keep
    future mistakes from happening in new source files.
  - Enable large file support (LFS) through the use of the AC_SYS_LARGEFILE
    autoconf macro. ecryptfs-utils has been well tested with LFS enabled
    because ecryptfs-utils is being built with
    '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' in Debian-based distros.
    This is mainly needed for some of the in-tree regression tests but
    ecryptfs-utils, in general, should be built with LFS enabled.
* debian/rules:
  - Don't append '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' to the CFLAGS
    now that the upstream build enables LFS
* tests/userspace/lfs.sh, tests/userspace/lfs/test.c:
  - Add a test to verify that LFS is enabled. This test is run under the
    make check target.
* tests/kernel/enospc/test.c:
  - Fix test failures on 32 bit architectures due to large file sizes
    overflowing data types

[ Dustin Kirkland ]
* src/utils/ecryptfs-setup-swap: LP: #1172014
  - write crypttab entry using UUID
* src/utils/ecryptfs-recover-private: LP: #1028532
  - error out, if we fail to mount the private data correctly

[ Colin King and Dustin Kirkland ]
* configure.ac, src/daemon/main.c, src/libecryptfs/cmd_ln_parser.c,
  src/libecryptfs/decision_graph.c, src/utils/mount.ecryptfs.c,
  tests/kernel/trunc-file/test.c:
  - remove some dead code, fix some minor issues raised by Coverity

lp:ubuntu/trusty/ecryptfs-utils bug 1 Development 2014-03-15 15:00:05 UTC
93. [ Colin King ] * src/libecryptfs/ecry...

Author: Nobuto Murata
Revision Date: 2013-02-21 01:56:33 UTC

[ Colin King ]
* src/libecryptfs/ecryptfs-stat.c, tests/kernel/extend-file-
  random/test.c, tests/kernel/inode-race-stat/test.c,
  tests/kernel/trunc-file/test.c:
  - Fixed some 32 bit build warnings
* src/libecryptfs/decision_graph.c, src/libecryptfs/key_management.c,
  src/libecryptfs/main.c, src/libecryptfs/module_mgr.c, src/utils/io.c,
  src/utils/mount.ecryptfs_private.c, tests/kernel/inotify/test.c,
  tests/kernel/trunc-file/test.c, tests/userspace/wrap-unwrap/test.c:
  - Fixed a pile of minor bugs (memory leaks, unclosed file descriptors,
    etc.) mostly in error paths
* src/key_mod/ecryptfs_key_mod_passphrase.c, src/libecryptfs/main.c,
  src/pam_ecryptfs/pam_ecryptfs.c:
  - more Coverity fixes, memory leak, error checking, etc.

[ Nobuto MURATA ]
* fix an empty update-notifier window (LP: #1107650)
  - changes made in Rev.758 was incomplete

[ Tyler Hicks ]
* doc/manpage/ecryptfs.7:
  - adjust man page text to avoid confusion about whether the interactive
    mount helper takes a capital 'N' for the answer to y/n questions
    (LP: #1130460)
* src/utils/ecryptfs_rewrap_passphrase.c:
  - Handle errors when interactively reading the new wrapping passphrase
    and the confirmation from stdin. Fixes a segfault (invalid memory read)
    in ecryptfs-rewrap-passphrase if there was an error while reading either
    of these passphrases.
* configure.ac:
  - Set AM_CPPFLAGS to always include config.h as the first include file.
    Some .c files correctly included config.h before anything else. The
    majority of .c files got this wrong by including it after other header
    files, including it multiple times, or not including it at all.
    Including it in the AM_CPPFLAGS should solve these problems and keep
    future mistakes from happening in new source files.
  - Enable large file support (LFS) through the use of the AC_SYS_LARGEFILE
    autoconf macro. ecryptfs-utils has been well tested with LFS enabled
    because ecryptfs-utils is being built with
    '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' in Debian-based distros.
    This is mainly needed for some of the in-tree regression tests but
    ecryptfs-utils, in general, should be built with LFS enabled.
* debian/rules:
  - Don't append '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' to the CFLAGS
    now that the upstream build enables LFS
* tests/userspace/lfs.sh, tests/userspace/lfs/test.c:
  - Add a test to verify that LFS is enabled. This test is run under the
    make check target.
* tests/kernel/enospc/test.c:
  - Fix test failures on 32 bit architectures due to large file sizes
    overflowing data types

[ Dustin Kirkland ]
* src/utils/ecryptfs-setup-swap: LP: #1172014
  - write crypttab entry using UUID
* src/utils/ecryptfs-recover-private: LP: #1028532
  - error out, if we fail to mount the private data correctly

[ Colin King and Dustin Kirkland ]
* configure.ac, src/daemon/main.c, src/libecryptfs/cmd_ln_parser.c,
  src/libecryptfs/decision_graph.c, src/utils/mount.ecryptfs.c,
  tests/kernel/trunc-file/test.c:
  - remove some dead code, fix some minor issues raised by Coverity

lp:ubuntu/trusty-proposed/ecryptfs-utils bug 2 Mature 2014-01-23 23:10:00 UTC
44. [ Colin King ] * src/libecryptfs/ecry...

Author: Nobuto Murata
Revision Date: 2013-02-21 01:56:33 UTC

[ Colin King ]
* src/libecryptfs/ecryptfs-stat.c, tests/kernel/extend-file-
  random/test.c, tests/kernel/inode-race-stat/test.c,
  tests/kernel/trunc-file/test.c:
  - Fixed some 32 bit build warnings
* src/libecryptfs/decision_graph.c, src/libecryptfs/key_management.c,
  src/libecryptfs/main.c, src/libecryptfs/module_mgr.c, src/utils/io.c,
  src/utils/mount.ecryptfs_private.c, tests/kernel/inotify/test.c,
  tests/kernel/trunc-file/test.c, tests/userspace/wrap-unwrap/test.c:
  - Fixed a pile of minor bugs (memory leaks, unclosed file descriptors,
    etc.) mostly in error paths
* src/key_mod/ecryptfs_key_mod_passphrase.c, src/libecryptfs/main.c,
  src/pam_ecryptfs/pam_ecryptfs.c:
  - more Coverity fixes, memory leak, error checking, etc.

[ Nobuto MURATA ]
* fix an empty update-notifier window (LP: #1107650)
  - changes made in Rev.758 was incomplete

[ Tyler Hicks ]
* doc/manpage/ecryptfs.7:
  - adjust man page text to avoid confusion about whether the interactive
    mount helper takes a capital 'N' for the answer to y/n questions
    (LP: #1130460)
* src/utils/ecryptfs_rewrap_passphrase.c:
  - Handle errors when interactively reading the new wrapping passphrase
    and the confirmation from stdin. Fixes a segfault (invalid memory read)
    in ecryptfs-rewrap-passphrase if there was an error while reading either
    of these passphrases.
* configure.ac:
  - Set AM_CPPFLAGS to always include config.h as the first include file.
    Some .c files correctly included config.h before anything else. The
    majority of .c files got this wrong by including it after other header
    files, including it multiple times, or not including it at all.
    Including it in the AM_CPPFLAGS should solve these problems and keep
    future mistakes from happening in new source files.
  - Enable large file support (LFS) through the use of the AC_SYS_LARGEFILE
    autoconf macro. ecryptfs-utils has been well tested with LFS enabled
    because ecryptfs-utils is being built with
    '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' in Debian-based distros.
    This is mainly needed for some of the in-tree regression tests but
    ecryptfs-utils, in general, should be built with LFS enabled.
* debian/rules:
  - Don't append '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' to the CFLAGS
    now that the upstream build enables LFS
* tests/userspace/lfs.sh, tests/userspace/lfs/test.c:
  - Add a test to verify that LFS is enabled. This test is run under the
    make check target.
* tests/kernel/enospc/test.c:
  - Fix test failures on 32 bit architectures due to large file sizes
    overflowing data types

[ Dustin Kirkland ]
* src/utils/ecryptfs-setup-swap: LP: #1172014
  - write crypttab entry using UUID
* src/utils/ecryptfs-recover-private: LP: #1028532
  - error out, if we fail to mount the private data correctly

[ Colin King and Dustin Kirkland ]
* configure.ac, src/daemon/main.c, src/libecryptfs/cmd_ln_parser.c,
  src/libecryptfs/decision_graph.c, src/utils/mount.ecryptfs.c,
  tests/kernel/trunc-file/test.c:
  - remove some dead code, fix some minor issues raised by Coverity

lp:ubuntu/saucy/ecryptfs-utils 2 Mature 2013-04-27 06:42:20 UTC
92. * fix an empty update-notifier window...

Author: Nobuto Murata
Revision Date: 2013-02-20 14:05:42 UTC

* fix an empty update-notifier window (LP: #1107650)
  - needed part was dropped accidentally at 102-0ubuntu1

lp:ubuntu/quantal-updates/ecryptfs-utils 2 Mature 2013-02-21 21:12:14 UTC
87. * Fix encrypted home/private race con...

Author: Tyler Hicks
Revision Date: 2012-12-04 14:12:27 UTC

* Fix encrypted home/private race condition that could result in encrypted
  filenames not being decrypted, despite the directory being mounted
  correctly otherwise. (LP: #1052038)
  - debian/patches/fix-private-mount-race.patch: Fix race condition by only
    opening the signature file once, rather than opening, reading, and
    closing it for each key signature.

lp:ubuntu/raring/ecryptfs-utils bug 1 Development 2013-02-21 21:12:03 UTC
92. * fix an empty update-notifier window...

Author: Nobuto Murata
Revision Date: 2013-02-20 14:05:42 UTC

* fix an empty update-notifier window (LP: #1107650)
  - needed part was dropped accidentally at 102-0ubuntu1

lp:ubuntu/raring-proposed/ecryptfs-utils bug 2 Mature 2013-02-20 14:05:42 UTC
92. * fix an empty update-notifier window...

Author: Nobuto Murata
Revision Date: 2013-02-20 14:05:42 UTC

* fix an empty update-notifier window (LP: #1107650)
  - needed part was dropped accidentally at 102-0ubuntu1

lp:ubuntu/precise-proposed/ecryptfs-utils bug 2 Mature 2013-02-06 07:13:50 UTC
83. * Fix encrypted home/private race con...

Author: Tyler Hicks
Revision Date: 2012-12-04 14:12:55 UTC

* Fix encrypted home/private race condition that could result in encrypted
  filenames not being decrypted, despite the directory being mounted
  correctly otherwise. (LP: #1052038)
  - debian/patches/fix-private-mount-race.patch: Fix race condition by only
    opening the signature file once, rather than opening, reading, and
    closing it for each key signature.

lp:ubuntu/quantal-proposed/ecryptfs-utils bug 2 Mature 2013-01-31 18:21:29 UTC
87. * Fix encrypted home/private race con...

Author: Tyler Hicks
Revision Date: 2012-12-04 14:12:27 UTC

* Fix encrypted home/private race condition that could result in encrypted
  filenames not being decrypted, despite the directory being mounted
  correctly otherwise. (LP: #1052038)
  - debian/patches/fix-private-mount-race.patch: Fix race condition by only
    opening the signature file once, rather than opening, reading, and
    closing it for each key signature.

lp:ubuntu/oneiric-proposed/ecryptfs-utils bug 2 Mature 2013-01-31 18:21:27 UTC
77. * Fix encrypted home/private race con...

Author: Tyler Hicks
Revision Date: 2012-12-04 14:13:46 UTC

* Fix encrypted home/private race condition that could result in encrypted
  filenames not being decrypted, despite the directory being mounted
  correctly otherwise. (LP: #1052038)
  - debian/patches/fix-private-mount-race.patch: Fix race condition by only
    opening the signature file once, rather than opening, reading, and
    closing it for each key signature.

lp:ubuntu/oneiric-updates/ecryptfs-utils 2 Mature 2012-12-04 14:13:46 UTC
77. * Fix encrypted home/private race con...

Author: Tyler Hicks
Revision Date: 2012-12-04 14:13:46 UTC

* Fix encrypted home/private race condition that could result in encrypted
  filenames not being decrypted, despite the directory being mounted
  correctly otherwise. (LP: #1052038)
  - debian/patches/fix-private-mount-race.patch: Fix race condition by only
    opening the signature file once, rather than opening, reading, and
    closing it for each key signature.

lp:~arges/ubuntu/precise/ecryptfs-utils/fix-lp1052038 bug 1 Development 2012-10-26 15:11:19 UTC
83. [ Dustin Kirkland ] * src/utils/mount...

Author: Chris J Arges
Revision Date: 2012-10-26 15:09:12 UTC

[ Dustin Kirkland ]
* src/utils/mount.ecryptfs_private.c: LP: #1052038
  - fix race condition, which typically manifests itself with a user
    saying that their home directory is not accessible, or that their
    filenames are not decrypted
  - the root of the problem is that we were reading the signature file,
    ~/.ecryptfs/Private.sig, twice; in some cases, the first one succeeds,
    so the file encryption signature is read and key is loaded, but then
    some other process (usually from PAM, perhaps a cron job or a
    subsequent login) mounts the home directory before the filename
    encryption key is loaded; thus, $HOME is mounted but filenames are
    not decrypted, so the second read of ~/.ecryptfs/Private.sig fails
    as that file is not found
  - the solution is to rework the internal fetch_sig() function and read
    one or both signatures within a single open/read/close operation of
    the file

lp:ubuntu/quantal/ecryptfs-utils bug 2 Mature 2012-08-06 07:50:18 UTC
86. [ Tyler Hicks ] * src/pam_ecryptfs/pa...

Author: Dustin Kirkland 
Revision Date: 2012-08-02 16:33:55 UTC

[ Tyler Hicks ]
* src/pam_ecryptfs/pam_ecryptfs.c, src/libecryptfs/key_management.c:
    LP: #1024476
  - fix regression introduced in ecryptfs-utils-99 when Encrypted
    Home/Private is in use and the eCryptfs kernel code is compiled as a
    module
  - drop check for kernel filename encryption support in pam_ecryptfs, as
    appropriate privileges to load the eCryptfs kernel module may not be
    available and filename encryption has been supported since 2.6.29
  - always add filename encryption key to the kernel keyring from pam mount

[ Colin King ]
* tests/kernel/inode-race-stat/test.c:
  - limit number of forks based on fd limits
* tests/kernel/enospc.sh, tests/kernel/enospc/test.c,
  tests/kernel/Makefile.am, tests/kernel/tests.rc:
  - add test case for ENOSPC

[ Tim Harder ]
* m4/ac_python_devel.m4: LP: #1029217
  - properly save and restore CPPFLAGS and LIBS when python support is
    enabled

lp:ubuntu/precise/ecryptfs-utils bug 2 Mature 2012-04-18 19:21:20 UTC
82. src/utils/ecryptfs-setup-swap: Skip /...

Author: Colin Watson
Revision Date: 2012-04-18 15:52:45 UTC

src/utils/ecryptfs-setup-swap: Skip /dev/zram* swap devices
(LP: #979350).

lp:ubuntu/natty-proposed/ecryptfs-utils bug 2 Mature 2011-09-06 18:53:53 UTC
72. * src/libecryptfs/key_management.c: L...

Author: Dustin Kirkland 
Revision Date: 2011-09-02 17:47:19 UTC

* src/libecryptfs/key_management.c: LP: #725862
  - fix nasty bug affecting users who do *not* encrypt filenames;
    the first login works, but on logout, only one key gets
    cleaned out; subsequent logins do not insert the necessary key
    due to an early "goto out"

lp:ubuntu/maverick-proposed/ecryptfs-utils bug 2 Mature 2011-09-06 18:52:53 UTC
67. * src/libecryptfs/key_management.c: L...

Author: Dustin Kirkland 
Revision Date: 2011-09-02 17:46:45 UTC

* src/libecryptfs/key_management.c: LP: #725862
  - fix nasty bug affecting users who do *not* encrypt filenames;
    the first login works, but on logout, only one key gets
    cleaned out; subsequent logins do not insert the necessary key
    due to an early "goto out"

lp:ubuntu/lucid-proposed/ecryptfs-utils bug 2 Mature 2011-09-06 18:49:30 UTC
67. * src/libecryptfs/key_management.c: L...

Author: Dustin Kirkland 
Revision Date: 2011-09-02 17:47:02 UTC

* src/libecryptfs/key_management.c: LP: #725862
  - fix nasty bug affecting users who do *not* encrypt filenames;
    the first login works, but on logout, only one key gets
    cleaned out; subsequent logins do not insert the necessary key
    due to an early "goto out"

lp:ubuntu/natty-updates/ecryptfs-utils 2 Mature 2011-09-02 17:47:19 UTC
72. * src/libecryptfs/key_management.c: L...

Author: Dustin Kirkland 
Revision Date: 2011-09-02 17:47:19 UTC

* src/libecryptfs/key_management.c: LP: #725862
  - fix nasty bug affecting users who do *not* encrypt filenames;
    the first login works, but on logout, only one key gets
    cleaned out; subsequent logins do not insert the necessary key
    due to an early "goto out"

lp:ubuntu/oneiric/ecryptfs-utils bug 2 Mature 2011-09-01 22:20:25 UTC
75. * src/libecryptfs/key_management.c: L...

Author: Dustin Kirkland 
Revision Date: 2011-09-01 16:25:03 UTC

* src/libecryptfs/key_management.c: LP: #725862
  - fix nasty bug affecting users who do *not* encrypt filenames;
    the first login works, but on logout, only one key gets
    cleaned out; subsequent logins do not insert the necessary key
    due to an early "goto out"; this fix needs to be SRU'd
* debian/rules: LP: #586281
  - fix perms on desktop mount file
* src/pam_ecryptfs/pam_ecryptfs.c: LP: #838471
  - rework syslogging to be less noisy and note pam_ecryptfs

lp:ubuntu/natty-security/ecryptfs-utils bug 2 Mature 2011-08-31 18:15:28 UTC
71. * SECURITY UPDATE: wrong mtab ownersh...

Author: Marc Deslauriers
Revision Date: 2011-08-22 14:10:47 UTC

* SECURITY UPDATE: wrong mtab ownership and permissions (LP: #830850)
  - debian/patches/CVE-2011-3145.patch: also set gid and umask before
    updating mtab in src/utils/mount.ecryptfs_private.c.
  - CVE-2011-3145

lp:ubuntu/maverick-security/ecryptfs-utils bug 2 Mature 2011-08-31 18:15:26 UTC
67. * SECURITY UPDATE: wrong mtab ownersh...

Author: Marc Deslauriers
Revision Date: 2011-08-22 15:41:50 UTC

* SECURITY UPDATE: wrong mtab ownership and permissions (LP: #830850)
  - src/utils/mount.ecryptfs_private.c: also set gid and umask before
    updating mtab.
  - CVE-2011-3145

lp:ubuntu/maverick-updates/ecryptfs-utils 2 Mature 2011-08-22 15:41:50 UTC
67. * SECURITY UPDATE: wrong mtab ownersh...

Author: Marc Deslauriers
Revision Date: 2011-08-22 15:41:50 UTC

* SECURITY UPDATE: wrong mtab ownership and permissions (LP: #830850)
  - src/utils/mount.ecryptfs_private.c: also set gid and umask before
    updating mtab.
  - CVE-2011-3145

lp:ubuntu/natty/ecryptfs-utils bug 2 Mature 2011-03-14 20:15:47 UTC
69. [ Paolo Bonzini <pbonzini@redhat.com>...

Author: Dustin Kirkland 
Revision Date: 2011-03-09 13:31:29 UTC

[ Paolo Bonzini <pbonzini@redhat.com> ]
* src/utils/ecryptfs-setup-private: update the Private.* selinux
  contexts

[ Dustin Kirkland ]
* src/utils/ecryptfs-setup-private:
  - add -p to mkdir, address noise for a non-error
  - must insert keys during testing phase, since we remove keys on
    unmount now, LP: #725862
* src/utils/ecryptfs_rewrap_passphrase.c: confirm passphrases in
  interactive mode, LP: #667331

lp:ubuntu/karmic-proposed/ecryptfs-utils bug 2 Mature 2011-03-08 09:21:35 UTC
61. * Cherry-pick upstream commit bzr r52...

Author: Dustin Kirkland 
Revision Date: 2011-02-11 17:19:37 UTC

* Cherry-pick upstream commit bzr r520
* src/utils/mount.ecryptfs_private.c:
  - fix bug LP: #313812, clear used keys on unmount
  - add ecryptfs_unlink_sigs to the mount opts, so that unmounts from
    umount.ecryptfs behave similarly
  - use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek

lp:~serge-hallyn/ubuntu/natty/ecryptfs-utils/emount 1 Development 2011-02-10 19:38:55 UTC
68. Re-integrate emount

Author: Serge Hallyn
Revision Date: 2011-02-10 19:34:44 UTC

Re-integrate emount

lp:~serge-hallyn/ubuntu/natty/ecryptfs-utils/emount3 1 Development 2011-01-03 21:18:34 UTC
69. slightly better changelog (Create 'em...

Author: Serge Hallyn
Revision Date: 2011-01-03 21:18:34 UTC

slightly better changelog (Create 'emount' to more easily mount ecryptfs dirs)

lp:~serge-hallyn/ubuntu/natty/ecryptfs-utils/emount2 1 Development 2010-12-20 18:59:07 UTC
73. bump version name again

Author: Serge Hallyn
Revision Date: 2010-12-20 18:59:07 UTC

bump version name again

lp:~serge-hallyn/ubuntu/maverick/ecryptfs-utils/emount2 1 Development 2010-10-26 21:56:06 UTC
71. Get a (hopefully) 'correct' version n...

Author: Serge Hallyn
Revision Date: 2010-10-26 21:56:06 UTC

Get a (hopefully) 'correct' version number to plop in ppa

lp:~serge-hallyn/ubuntu/maverick/ecryptfs-utils/emount 1 Development 2010-10-26 13:37:49 UTC
90. remove debugging stmt

Author: Serge Hallyn
Revision Date: 2010-10-26 13:37:49 UTC

remove debugging stmt

lp:ubuntu/maverick/ecryptfs-utils 2 Mature 2010-05-01 01:01:04 UTC
65. src/desktop/ecryptfs-record-passphras...

Author: Dustin Kirkland 
Revision Date: 2010-02-18 18:07:48 UTC

src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139

lp:ubuntu/lucid/ecryptfs-utils bug 1 Development 2010-02-22 17:56:44 UTC
65. src/desktop/ecryptfs-record-passphras...

Author: Dustin Kirkland 
Revision Date: 2010-02-18 18:07:48 UTC

src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139

lp:~dpm/ubuntu/lucid/ecryptfs-utils/bug-358283 bug(Has a merge proposal) 1 Development 2010-02-17 18:42:06 UTC
65. Added Catalan translation for testing...

Author: David Planella
Revision Date: 2010-02-17 18:42:06 UTC

Added Catalan translation for testing purposes

lp:ubuntu/jaunty-security/ecryptfs-utils bug 2 Mature 2009-12-09 15:10:47 UTC
49. * SECURITY UPDATE: mount passphrase r...

Author: Dustin Kirkland 
Revision Date: 2009-06-04 11:29:58 UTC

* SECURITY UPDATE: mount passphrase recorded in install log (LP: #383650).
  - debian/ecryptfs-utils.postinst: prune private information from
    installer log
  - src/utils/ecryptfs-setup-private: don't echo passphrase if running in
    bootstrap mode
  - CVE-2009-1296

lp:ubuntu/karmic/ecryptfs-utils 2 Mature 2009-12-09 15:09:54 UTC
60. * src/utils/ecryptfs-setup-private, d...

Author: Dustin Kirkland 
Revision Date: 2009-10-20 13:42:43 UTC

* src/utils/ecryptfs-setup-private, debian/control: LP: #456565
  - fix typo, s/getext/gettext
  - depend on gettext-base

lp:ubuntu/jaunty-updates/ecryptfs-utils 2 Mature 2009-12-09 15:09:32 UTC
49. * SECURITY UPDATE: mount passphrase r...

Author: Dustin Kirkland 
Revision Date: 2009-06-04 11:29:58 UTC

* SECURITY UPDATE: mount passphrase recorded in install log (LP: #383650).
  - debian/ecryptfs-utils.postinst: prune private information from
    installer log
  - src/utils/ecryptfs-setup-private: don't echo passphrase if running in
    bootstrap mode
  - CVE-2009-1296

lp:ubuntu/jaunty/ecryptfs-utils 2 Mature 2009-12-09 15:09:05 UTC
48. Fix for LP: #357354, (Upstream revisi...

Author: Dustin Kirkland 
Revision Date: 2009-04-07 15:35:45 UTC

Fix for LP: #357354, (Upstream revision 375)
change "ecryptfs-remind-passphrase" to "ecryptfs-record-passphrase",
which is far more accurate to what's actually being done

lp:ubuntu/intrepid-updates/ecryptfs-utils 2 Mature 2009-12-09 15:08:55 UTC
31. Fixes for LP: #259631, add interactiv...

Author: Dustin Kirkland 
Revision Date: 2008-11-04 09:34:41 UTC

Fixes for LP: #259631, add interactive mounting capability
* debian/rules, debian/ecryptfs-utils.dirs,
  debian/ecryptfs-utils.install, debian/ecryptfs-mount-private.desktop,
  debian/ecryptfs-mount-private.txt: install the new desktop shortcut
  file and readme.txt to /usr/share/ecryptfs-utils
* debian/patches/60_interactive_mount.dpatch: modify ecryptfs-mount-private
  utility to interactively prompt for password
* debian/patches/00list: updated accordingly

lp:ubuntu/intrepid-proposed/ecryptfs-utils 2 Mature 2009-12-09 15:08:43 UTC
31. Fixes for LP: #259631, add interactiv...

Author: Dustin Kirkland 
Revision Date: 2008-11-04 09:34:41 UTC

Fixes for LP: #259631, add interactive mounting capability
* debian/rules, debian/ecryptfs-utils.dirs,
  debian/ecryptfs-utils.install, debian/ecryptfs-mount-private.desktop,
  debian/ecryptfs-mount-private.txt: install the new desktop shortcut
  file and readme.txt to /usr/share/ecryptfs-utils
* debian/patches/60_interactive_mount.dpatch: modify ecryptfs-mount-private
  utility to interactively prompt for password
* debian/patches/00list: updated accordingly

lp:ubuntu/intrepid/ecryptfs-utils 2 Mature 2009-12-09 15:08:35 UTC
29. * debian/patches/55_check_password_an...

Author: Dustin Kirkland 
Revision Date: 2008-10-23 12:53:30 UTC

* debian/patches/55_check_password_and_remove_from_proc.dpatch:
  Fix ecryptfs-add-passphrase and ecryptfs-wrap-passphrase to take
  passphrases on standard, to protect from disclosure on the process
  table; fix callers in ecryptfs-setup-private (LP: #287908).
  Validate that the user password is correct with unix_chkpwd (LP: #287906).
* debian/patches/00list: updated accordingly

lp:ubuntu/hardy/ecryptfs-utils 2 Mature 2009-12-09 15:08:26 UTC
8. * Temporarily only use tpm toolchain ...

Author: Daniel Baumann
Revision Date: 2008-01-17 23:47:00 UTC

* Temporarily only use tpm toolchain on i386 (Closes: #461233).
* Current upstream should build without patches on amd64 (Closes: #445619).
* Added --fail-missing to dh_install call in rules.
* Updated .install files to cover additional files.

lp:ubuntu/gutsy/ecryptfs-utils 1 Development 2009-12-09 15:08:09 UTC
5. Messed up previous upload, missed ori...

Author: Barry deFreese
Revision Date: 2007-08-15 15:33:45 UTC

Messed up previous upload, missed orig.tar.gz

154 of 54 results