UbuntuUpdates.org

Package "ecryptfs-utils"

Name: ecryptfs-utils

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • ecryptfs cryptographic filesystem (python)

Latest version: 104-0ubuntu1.14.04.4
Release: trusty (14.04)
Level: updates
Repository: universe

Links



Other versions of "ecryptfs-utils" in Trusty

Repository Area Version
base universe 104-0ubuntu1
base main 104-0ubuntu1
security universe 104-0ubuntu1.14.04.4
security main 104-0ubuntu1.14.04.4
updates main 104-0ubuntu1.14.04.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 104-0ubuntu1.14.04.4 2016-01-20 17:06:59 UTC

  ecryptfs-utils (104-0ubuntu1.14.04.4) trusty-security; urgency=medium

  * SECURITY UPDATE: Don't allow mount.ecryptfs_private to be used to mount on
    top of pseudo filesystem such as procfs
    - debian/patches/CVE-2016-1572.patch: Check the filesystem type of the
      mount destination against a whitelist of approved types.
    - CVE-2016-1572
  * debian/patches/CVE-2014-9687.patch: Update patch to return an error when a
    version 1 wrapped passphrase file could not be read.

 -- Tyler Hicks Fri, 15 Jan 2016 17:48:52 -0600

Source diff to previous version
CVE-2016-1572 privilege escalation by overmounting /proc/$pid
CVE-2014-9687 eCryptfs key wrapping help to crack user password

Version: 104-0ubuntu1.14.04.3 2015-03-30 01:06:31 UTC

  ecryptfs-utils (104-0ubuntu1.14.04.3) trusty-security; urgency=medium

  * SECURITY UPDATE: Mount passphrase wrapped with a default salt value
    - debian/patches/CVE-2014-9687.patch: Generate a random salt when wrapping
      the mount passphrase. If a user has a mount passphrase that was wrapped
      using the default salt, their mount passphrase will be rewrapped using a
      random salt when they log in with their password.
    - debian/patches/CVE-2014-9687.patch: Create a temporary file when
      creating a new wrapped-passphrase file and copy it to its final
      destination after the file has been fully synced to disk (LP: #1020902)
    - debian/rules: Set the executable bit on the
      v1-to-v2-wrapped-passphrase.sh test script that was created by
      wrapping-passphrase-salt.patch
    - CVE-2014-9687
 -- Tyler Hicks <email address hidden> Wed, 04 Mar 2015 16:39:28 -0600

1020902 ecryptfs may truncate encrypted passphrase store
CVE-2014-9687 eCryptfs key wrapping help to crack user password



About   -   Send Feedback to @ubuntu_updates