Hello community,

here is the log from the commit of package ecryptfs-utils.1928 for 
openSUSE:12.3:Update checked in at 2013-08-14 14:55:09
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.3:Update/ecryptfs-utils.1928 (Old)
 and      /work/SRC/openSUSE:12.3:Update/.ecryptfs-utils.1928.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "ecryptfs-utils.1928"

Changes:
--------
New Changes file:

--- /dev/null   2013-07-23 23:44:04.804033756 +0200
+++ 
/work/SRC/openSUSE:12.3:Update/.ecryptfs-utils.1928.new/ecryptfs-utils.changes  
    2013-08-14 14:55:10.000000000 +0200
@@ -0,0 +1,264 @@
+-------------------------------------------------------------------
+Tue Aug  6 08:06:23 UTC 2013 - [email protected]
+
+- update to 103
+- move -pie/-fpie into separate patch
+- update ecryptfs-setup-swap-SuSE.patch for systmd and fstab
+  without UUID lables (bnc#814098)
+- remove ecryptfs-utils.security.patch, fixed upstream 
+- add PreReq: permissions
+- removed unpackaged doc
+
+-------------------------------------------------------------------
+Wed Jul 11 11:48:24 UTC 2012 - [email protected]
+
+- also supply MS_NODEV to avoid exposing device files
+  if someone got them on the encrypted media.
+
+-------------------------------------------------------------------
+Tue Jul 10 14:03:27 UTC 2012 - [email protected]
+
+- point the desktop link to the right .desktop file
+- build mount.ecryptfs_private with -pie/-fpie
+
+-------------------------------------------------------------------
+Wed Jul  4 11:08:11 UTC 2012 - [email protected]
+
+- hook pam_ecryptfs into pam session and auth bnc#755475
+
+-------------------------------------------------------------------
+Thu Jun 21 06:19:46 UTC 2012 - [email protected]
+
+- added security improvements to mount.ecryptfs_private
+  and pam_ecryptfs (bnc#740110)
+
+-------------------------------------------------------------------
+Fri Apr  6 15:33:03 UTC 2012 - [email protected]
+
+- patch so ecryptfs-setup-swap executes boot.crypto 
+
+-------------------------------------------------------------------
+Wed Mar 28 14:47:13 UTC 2012 - [email protected]
+
+- updated to 96
+  - bugfixes
+  - testsuite added
+  - ecryptfs-verify utility added
+  - write-read test utility
+- mark /sbin/mount.eccryptfs_private as setuidable (bnc#745584 , bnc#740110)
+
+-------------------------------------------------------------------
+Fri Sep 30 20:07:57 UTC 2011 - [email protected]
+
+- add libtool as buildrequire to make the spec file more reliable
+
+-------------------------------------------------------------------
+Tue Sep 20 15:32:22 CEST 2011 - [email protected]
+
+- Updated to 92
+  * Fix umask issue introduced by last security update
+  * some bugfixes
+
+-------------------------------------------------------------------
+Sun Sep 18 17:17:12 UTC 2011 - [email protected]
+
+- Remove redundant/obsolete tags/sections from specfile
+  (cf. packaging guidelines)
+- Put make call in the right spot
+- Use %_smp_mflags for parallel build
+
+-------------------------------------------------------------------
+Thu Aug 11 17:25:21 CEST 2011 - [email protected]
+
+- Updated to 90
+  Fixed several security issues:
+  * CVE-2011-1831 - Race condition when checking mountpoint during mount.
+  * CVE-2011-1832 - Race condition when checking mountpoint during unmount.
+  * CVE-2011-1833 - Race condition when checking source during mount.
+  * CVE-2011-1834 - Improper mtab handling allowing corruption due to resource
+    limits, signals, etc.
+  * CVE-2011-1835 - Key poisoning in ecryptfs-setup-private due to insecure 
temp
+    directory.
+  * CVE-2011-1836 - ecryptfs-recover-private mounts directly in /tmp
+  * CVE-2011-1837 - Predictable lock counter name and associated races.
+
+  New ecryptfs-find binary to find by inode.
+
+-------------------------------------------------------------------
+Mon Apr 18 17:06:50 CEST 2011 - [email protected]
+
+- Updated to 87
+  * src/utils/ecryptfs-setup-private: update the Private.* selinux
+    contexts
+  * src/utils/ecryptfs-setup-private:
+    - add -p to mkdir, address noise for a non-error
+    - must insert keys during testing phase, since we remove keys on
+      unmount now, LP: #725862
+  * src/utils/ecryptfs_rewrap_passphrase.c: confirm passphrases in
+    interactive mode, LP: #667331
+- Updated to 86
+  * src/pam_ecryptfs/pam_ecryptfs.c:
+    - check if this file exists and ask the user for the wrapping passphrase
+      if it does
+    - eliminate both ecryptfs_pam_wrapping_independent_set() and
+      ecryptfs_pam_automount_set() and replace with a reusable
+      file_exists_dotecryptfs() function
+  * src/utils/mount.ecryptfs_private.c:
+    - support multiple, user configurable private directories by way of
+      a command line "alias" argument
+    - this "alias" references a configuration file by the name of:
+      $HOME/.ecryptfs/alias.conf, which is in an fstab(5) format,
+      as well as $HOME/.ecryptfs/alias.sig, in the same format as
+      Private.sig
+    - if no argument specified, the utility operates in legacy mode,
+      defaulting to "Private"
+    - rename variables, s/dev/src/ and s/mnt/dest/
+    - add a read_config() function
+    - add an alias char* to replace the #defined ECRYPTFS_PRIVATE_DIR
+    - this is half of the fix to LP: #615657
+  * doc/manpage/mount.ecryptfs_private.1: document these changes
+  * src/libecryptfs/main.c, src/utils/mount.ecryptfs_private.c:
+    - allow umount.ecryptfs_private to succeed when the key is no
+      longer in user keyring.
+- Updated to 85
+  * src/utils/ecryptfs-recover-private: clean sigs of invalid characters
+  * src/utils/mount.ecryptfs_private.c:
+    - fix bug LP: #313812, clear used keys on unmount
+    - add ecryptfs_unlink_sigs to the mount opts, so that unmounts from
+      umount.ecryptfs behave similarly
+    - use ecryptfs_remove_auth_tok_from_keyring() on the sig and sig_fnek
+  * src/utils/ecryptfs-migrate-home:
+    - support user databases outside of /etc/passwd, LP: #627506
+- Updated to 84
+  * src/desktop/ecryptfs-record-passphrase: fix typo, LP: #524139
+  * debian/rules, debian/control:
+    - disable the gpg key module, as it's not yet functional
+    - clean up unneeded build-deps
+    - also, not using opencryptoki either
+  * doc/manpage/ecryptfs.7: fix minor documentation bug, reported by
+    email by Jon 'maddog' Hall
+  * doc/manpage/ecryptfs-recover-private.1, doc/manpage/Makefile.am,
+    po/POTFILES.in, src/utils/ecryptfs-recover-private,
+    src/utils/Makefile.am: add a utility to simplify data recovery
+    of an encrypted private directory from a Live ISO, LP: #689969
+
+-------------------------------------------------------------------
+Sat Apr 10 15:39:27 UTC 2010 - [email protected]
+
+- Fix build with adding requires on mozilla-nss-devel and python-devel.
+- Fix package list.
+
+-------------------------------------------------------------------
+Thu Mar 18 13:33:43 CET 2010 - [email protected]
+
+- Updated to 83
+  - lots of bugfixes
+  - improvements
+
+-------------------------------------------------------------------
+Sun Jan 31 22:03:16 UTC 2010 - [email protected]
+
+- Package baselibs.conf
+
+-------------------------------------------------------------------
+Thu Jun 25 12:37:06 CEST 2009 - [email protected]
+
+- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
+
+-------------------------------------------------------------------
+Fri Oct 24 13:58:01 CEST 2008 - [email protected]
+
+- Upgraded to version 61
+   - starts of filename encryption
+   - bugfixes
+
+-------------------------------------------------------------------
+Fri Sep 19 11:55:34 CEST 2008 - [email protected]
+
+- Upgraded to version 58
+   - config file changes yet again
+   - some documentation fixes
+   - some TPM related fixes
+
+-------------------------------------------------------------------
+Sat Aug 23 10:45:52 CEST 2008 - [email protected]
+
+- Upgraded to version 56
+   - more manpages
+   - changed configfile format
+
+-------------------------------------------------------------------
+Fri Jul 11 22:41:55 CEST 2008 - [email protected]
+
+- Upgraded to version 50
+  - another manpage
+  - bugfixes
+  - fixed kernel netlink interface
+
++++ 67 more lines (skipped)
++++ between /dev/null
++++ and 
/work/SRC/openSUSE:12.3:Update/.ecryptfs-utils.1928.new/ecryptfs-utils.changes

New:
----
  baselibs.conf
  ecryptfs-correct-desktop.patch
  ecryptfs-setup-swap-SuSE.patch
  ecryptfs-utils-src-utils-Makefile.patch
  ecryptfs-utils.changes
  ecryptfs-utils.spec
  ecryptfs-utils_103.orig.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ ecryptfs-utils.spec ++++++
#
# spec file for package ecryptfs-utils
#
# Copyright (c) 2013 SUSE LINUX Products GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.

# Please submit bugfixes or comments via http://bugs.opensuse.org/
#


Name:           ecryptfs-utils
Url:            https://launchpad.net/ecryptfs
Summary:        Userspace Utilities for ecryptfs
License:        GPL-2.0+
Group:          Productivity/Security
Version:        103
Release:        0
Source0:        
http://launchpad.net/ecryptfs/trunk/%version/+download/ecryptfs-utils_%version.orig.tar.gz
Source1:        baselibs.conf
# PATCH-FIX-OPENSUSE fix for systemd and no UUID in fstab
Patch0:         ecryptfs-setup-swap-SuSE.patch
# PATCH-FIX-OPENSUSE build with -fpie/-pie
Patch1:         ecryptfs-utils-src-utils-Makefile.patch
Patch2:         ecryptfs-correct-desktop.patch
BuildRoot:      %{_tmppath}/%{name}-%{version}-build
BuildRequires:  gtk2-devel
BuildRequires:  intltool
BuildRequires:  keyutils-devel
BuildRequires:  keyutils-libs
BuildRequires:  libgcrypt-devel
BuildRequires:  libtool
BuildRequires:  mozilla-nss-devel
BuildRequires:  openssl-devel
BuildRequires:  pam-config
BuildRequires:  pam-devel
BuildRequires:  pkcs11-helper-devel
BuildRequires:  python-devel
BuildRequires:  swig
BuildRequires:  trousers-devel
BuildRequires:  update-desktop-files
Requires(pre):  pam-config
PreReq:         permissions

%description
A stacked cryptographic filesystem for Linux.

%prep
%setup -q
%patch0 -p1
%patch1 -p1
%patch2 -p1

%build
export RPM_OPT_FLAGS="$RPM_OPT_FLAGS -fno-strict-aliasing"
autoreconf -i -f
%configure \
        --docdir=%_defaultdocdir/%{name} \
        --disable-static \
        --enable-tspi \
        --enable-pkcs11-helper \
        --with-pamdir=/%_lib/security
make %{?_smp_mflags}

%check
make check

%install
%makeinstall
mkdir -p $RPM_BUILD_ROOT/%{_datadir}/applications/
mv $RPM_BUILD_ROOT/%{_datadir}/ecryptfs-utils/*desktop 
$RPM_BUILD_ROOT/%{_datadir}/applications/
%suse_update_desktop_file ecryptfs-mount-private
%suse_update_desktop_file ecryptfs-setup-private
%find_lang %{name}

%verifyscript
%verify_permissions -e /sbin/mount.ecryptfs_private

%post
/sbin/ldconfig
%set_permissions /sbin/mount.ecryptfs_private
/usr/sbin/pam-config -a --ecryptfs

%postun
/sbin/ldconfig
/usr/sbin/pam-config -d --ecryptfs

%files -f %{name}.lang
%defattr(-, root, root)
%doc COPYING NEWS README THANKS doc/ecryptfs-faq.html
/usr/include/ecryptfs.h
%{_prefix}/bin/*
/sbin/mount.ecryptfs
/sbin/umount.ecryptfs
/sbin/umount.ecryptfs_private
%verify(not mode) /sbin/mount.ecryptfs_private
%{_libdir}/libecryptfs*
%{_libdir}/pkgconfig/libecryptfs.pc
%{_mandir}/man1/*ecryptfs*
%{_mandir}/man7/ecryptfs*
%{_mandir}/man8/*ecryptfs*
%{_libdir}/ecryptfs*
%{_datadir}/ecryptfs-utils
/%_lib/security/pam_ecryptfs.so
%{python_sitelib}/ecryptfs-utils
%{python_sitearch}/ecryptfs-utils
%{_datadir}/applications/ecryptfs-*

%changelog
++++++ baselibs.conf ++++++
ecryptfs-utils
  supplements "packageand(ecryptfs-utils:pam-<targettype>)"
++++++ ecryptfs-correct-desktop.patch ++++++
Index: ecryptfs-utils-96/src/utils/ecryptfs-setup-private
===================================================================
--- ecryptfs-utils-96.orig/src/utils/ecryptfs-setup-private
+++ ecryptfs-utils-96/src/utils/ecryptfs-setup-private
@@ -340,7 +340,7 @@ echo
 mkdir -m 700 -p "$CRYPTDIR" || error "$(gettext 'Could not create crypt 
directory')" "[$CRYPTDIR]"
 mkdir -m 700 -p "$MOUNTPOINT" || error "$(gettext 'Could not create mount 
directory')" "[$MOUNTPOINT]"
 ln -sf /usr/share/ecryptfs-utils/ecryptfs-mount-private.txt 
"$MOUNTPOINT"/README.txt
-ln -sf /usr/share/ecryptfs-utils/ecryptfs-mount-private.desktop 
"$MOUNTPOINT"/Access-Your-Private-Data.desktop
+ln -sf /usr/share/applications/ecryptfs-mount-private.desktop 
"$MOUNTPOINT"/Access-Your-Private-Data.desktop
 chmod 500 "$MOUNTPOINT"
 
 # Setup ~/.ecryptfs directory
++++++ ecryptfs-setup-swap-SuSE.patch ++++++
--- ecryptfs-utils-103/src/utils/ecryptfs-setup-swap    2013-08-05 
10:44:55.618908888 -0400
+++ ecryptfs-utils-103/src/utils/ecryptfs-setup-swap.mod        2013-08-05 
10:54:16.966419219 -0400
@@ -37,23 +37,20 @@
 usage() {
        echo
        echo `gettext "Usage:"`
-       echo "  $0 [-f|--force] [-n|--no-reload]"
+       echo "  $0 [-f|--force]"
        echo
        exit 1
 }
 
 # Handle command line options
 FORCE=0
+NO_RELOAD=1
 while [ ! -z "$1" ]; do
        case "$1" in
                -f|--force)
                        FORCE=1
                        shift 1
                ;;
-               -n|--no-reload)
-                       NO_RELOAD=1
-                       shift 1
-               ;;
                *)
                        usage
                ;;
@@ -149,7 +146,8 @@
 for swap in $swaps; do
        info `gettext "Setting up swap:"` "[$swap]"
        uuid=$(blkid -o value -s UUID $swap)
-       for target in "UUID=$uuid" $swap; do
+       suse_swap=$(grep swap /etc/fstab |cut -d' ' -f1)
+       for target in $suse_swap $swap; do
                if [ -n "$target" ] && grep -qs "^$target " /etc/fstab; then
                        sed -i "s:^$target :\#$target :" /etc/fstab
                        warn "Commented out your unencrypted swap from 
/etc/fstab"
@@ -166,7 +164,6 @@
        # Add fstab entry
        echo "/dev/mapper/cryptswap$i none swap sw 0 0" >> /etc/fstab
 done
-
 if [ "$NO_RELOAD" != 1 ]; then
        # Turn swap off
        swapoff -a
@@ -179,3 +176,4 @@
 fi
 
 info `gettext "Successfully setup encrypted swap!"`
+info "This will take effect after reboot"
++++++ ecryptfs-utils-src-utils-Makefile.patch ++++++
Index: ecryptfs-utils-96/src/utils/Makefile.am
===================================================================
--- ecryptfs-utils-96.orig/src/utils/Makefile.am
+++ ecryptfs-utils-96/src/utils/Makefile.am
@@ -58,7 +58,9 @@ ecryptfs_generate_tpm_key_CFLAGS = $(AM_
 ecryptfs_generate_tpm_key_LDADD = $(TSPI_LIBS)
 
 mount_ecryptfs_private_SOURCES = mount.ecryptfs_private.c
+mount_ecryptfs_private_CFLAGS = $(AM_CFLAGS) -fpie
 mount_ecryptfs_private_LDADD = $(top_builddir)/src/libecryptfs/libecryptfs.la 
$(KEYUTILS_LIBS)
+mount_ecryptfs_private_LDFLAGS = -pie
 
 ecryptfs_stat_SOURCES = ecryptfs-stat.c
 ecryptfs_stat_LDADD = $(top_builddir)/src/libecryptfs/libecryptfs.la
-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to