Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1307

Опубликовано: 08 сент. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1307: ecryptfs-utils security, bug fix, and enhancement update (LOW)

[75-4]

  • fix EOF handling (#499367)
  • add icon to gui desktop file

[75-3]

  • ask for password confirmation when creating openssl key (#500850)
  • removed executable permission from ecryptfs-dot-private (#500817)
  • ecryptfs-rewrite-file: improve of progress output (#500813)
  • dont error out when unwrapping and adding a key that already exists (#500810)
  • fix typo in ecryptfs-rewrite-file(1) (#500804)
  • add error message about full keyring (#501460)
  • gui sub-package must requires pygtk2-libglade (#500997)
  • require cryptsetup-luks for encrypted swap (#500824)
  • use blkid instead of vol_id (#500820)
  • dont rely on cryptdisks service (#500829)

[75-2]

  • dont hang when used with wrong/missing stdin (#499367)
  • dont print error when key already removed (#499167)
  • refuse mounting with too small rsa key (#499175)
  • dont error out when adding key that already exists (#500361)
  • allow only working key sizes (#500352)
  • retutn nonzero when fnek is not supported (#500566)
  • add icon for Access-Your-Private-Data.desktop file (#500623)
  • fix information about openssl_passwd in openssl_passwd_file (#499128)
  • dont list mount.ecryptfs_private twice

[75-1]

  • update to 75 and drop some patches

[74-24]

  • add suid mount.ecryptfs_private, restrict it to ecryptfs group

[74-23]

  • skip releases -2 - -22 to be sure its always newer nvr

[74-22]

  • drop setuid for mount.ecryptfs_private
  • resolves: #482834

[74-1]

  • update to 74
  • fix difference between apps. real names and names in usage messages (#475969)
  • describe verobse and verbosity=X in man page (#470444)
  • adding passphrase to keyring is fixed (#469662)
  • mount wont fail with wrong/empty input to yes/no questions (#466210)
  • try to load modules instead of failing when its missing (#460496)
  • fix wrong return codes (#479429)
  • resolves: #482834

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

ecryptfs-utils

75-5.el5

ecryptfs-utils-devel

75-5.el5

ecryptfs-utils-gui

75-5.el5

Oracle Linux x86_64

ecryptfs-utils

75-5.el5

ecryptfs-utils-devel

75-5.el5

ecryptfs-utils-gui

75-5.el5

Oracle Linux i386

ecryptfs-utils

75-5.el5

ecryptfs-utils-devel

75-5.el5

ecryptfs-utils-gui

75-5.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 16 лет назад

The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.

redhat
больше 16 лет назад

The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.

nvd
больше 16 лет назад

The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.

debian
больше 16 лет назад

The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and ( ...

github
около 3 лет назад

The (1) ecryptfs-setup-private, (2) ecryptfs-setup-confidential, and (3) ecryptfs-setup-pam-wrapped.sh scripts in ecryptfs-utils 45 through 61 in eCryptfs place cleartext passwords on command lines, which allows local users to obtain sensitive information by listing the process.