Описание
ELSA-2009-1307: ecryptfs-utils security, bug fix, and enhancement update (LOW)
[75-4]
- fix EOF handling (#499367)
- add icon to gui desktop file
[75-3]
- ask for password confirmation when creating openssl key (#500850)
- removed executable permission from ecryptfs-dot-private (#500817)
- ecryptfs-rewrite-file: improve of progress output (#500813)
- dont error out when unwrapping and adding a key that already exists (#500810)
- fix typo in ecryptfs-rewrite-file(1) (#500804)
- add error message about full keyring (#501460)
- gui sub-package must requires pygtk2-libglade (#500997)
- require cryptsetup-luks for encrypted swap (#500824)
- use blkid instead of vol_id (#500820)
- dont rely on cryptdisks service (#500829)
[75-2]
- dont hang when used with wrong/missing stdin (#499367)
- dont print error when key already removed (#499167)
- refuse mounting with too small rsa key (#499175)
- dont error out when adding key that already exists (#500361)
- allow only working key sizes (#500352)
- retutn nonzero when fnek is not supported (#500566)
- add icon for Access-Your-Private-Data.desktop file (#500623)
- fix information about openssl_passwd in openssl_passwd_file (#499128)
- dont list mount.ecryptfs_private twice
[75-1]
- update to 75 and drop some patches
[74-24]
- add suid mount.ecryptfs_private, restrict it to ecryptfs group
[74-23]
- skip releases -2 - -22 to be sure its always newer nvr
[74-22]
- drop setuid for mount.ecryptfs_private
- resolves: #482834
[74-1]
- update to 74
- fix difference between apps. real names and names in usage messages (#475969)
- describe verobse and verbosity=X in man page (#470444)
- adding passphrase to keyring is fixed (#469662)
- mount wont fail with wrong/empty input to yes/no questions (#466210)
- try to load modules instead of failing when its missing (#460496)
- fix wrong return codes (#479429)
- resolves: #482834
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
ecryptfs-utils
75-5.el5
ecryptfs-utils-devel
75-5.el5
ecryptfs-utils-gui
75-5.el5
Oracle Linux x86_64
ecryptfs-utils
75-5.el5
ecryptfs-utils-devel
75-5.el5
ecryptfs-utils-gui
75-5.el5
Oracle Linux i386
ecryptfs-utils
75-5.el5
ecryptfs-utils-devel
75-5.el5
ecryptfs-utils-gui
75-5.el5
Связанные CVE
Связанные уязвимости
The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.
The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.
The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.
The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and ( ...
The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.