Skip to navigation

Bug Fix Advisory ecryptfs-utils bug fix and enhancement update

Advisory: RHBA-2009:0203-5
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2009-01-20
Last updated on: 2009-01-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated ecryptfs-utils packages that fix a bug and add various enhancements
are now available.

eCryptfs is a stacked, cryptographic file-system included in the Linux
kernel. It is transparent to the underlying file-system and provides
per-file granularity.

eCryptfs was first released as a Technology Preview for Red Hat Enterprise
Linux 5.2. These updated ecryptfs-utils packages have all been upgraded to
upstream version 56, which provides a number of bug fixes and enhancements
over the previous version. In addition, these packages provide a graphical
program to help configure and use eCryptfs. To start this program, run the
following command:

ecryptfs-mount-helper-gui

Important: the syntax of certain eCryptfs mount options has changed. Users
who were previously using the initial Technology Preview release of
ecryptfs-utils are advised to refer to the ecryptfs(7) manual page, and to
update any affected mount scripts and /etc/fstab entries for eCryptfs file
systems.

These updated ecryptfs-utils packages provide various enhancements,
including a mount helper and supporting libraries to perform key management
and mount functions.

In addition, these updated ecryptfs-utils packages fix a bug related to the
'verbosity' parameter of the mount.ecryptfs command. The option
'verbosity=0' was incorrectly passed as a parameter to /sbin/mount, which
resulted in the following message being logged to syslog:
"ecryptfs_parse_options: eCryptfs: unrecognized option 'verbosity=0'". In
these updated packages, the mount.encryptfs command no longer attempts to
pass this parameter to /sbin/mount, thus resolving the issue.

Users are advised to upgrade to these updated ecryptfs-utils packages,
which resolve this issue and add these enhancements.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ecryptfs-utils-56-8.el5.src.rpm
File outdated by:  RHBA-2011:1503
    MD5: 13e6df4729cfaf4595953adae26633f9
 
IA-32:
ecryptfs-utils-devel-56-8.el5.i386.rpm
File outdated by:  RHBA-2011:1503
    MD5: 7f06831960dfa6783ab985bbee4c1571
 
x86_64:
ecryptfs-utils-devel-56-8.el5.i386.rpm
File outdated by:  RHBA-2011:1503
    MD5: 7f06831960dfa6783ab985bbee4c1571
ecryptfs-utils-devel-56-8.el5.x86_64.rpm
File outdated by:  RHBA-2011:1503
    MD5: ed9bf34441fec8105ad5d1f9a036ff42
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ecryptfs-utils-56-8.el5.src.rpm
File outdated by:  RHBA-2011:1503
    MD5: 13e6df4729cfaf4595953adae26633f9
 
IA-32:
ecryptfs-utils-56-8.el5.i386.rpm
File outdated by:  RHBA-2011:1503
    MD5: b95600436744b391cfc4b85d6bb088fc
ecryptfs-utils-devel-56-8.el5.i386.rpm
File outdated by:  RHBA-2011:1503
    MD5: 7f06831960dfa6783ab985bbee4c1571
 
IA-64:
ecryptfs-utils-56-8.el5.ia64.rpm
File outdated by:  RHBA-2011:1503
    MD5: 9a7cc035c8099f47e5a01b48c6b7a39b
ecryptfs-utils-devel-56-8.el5.ia64.rpm
File outdated by:  RHBA-2011:1503
    MD5: 943a58b83064db4b1f2966babda54e45
 
PPC:
ecryptfs-utils-56-8.el5.ppc.rpm
File outdated by:  RHBA-2011:1503
    MD5: 5130133cda2e163754006f41faa86738
ecryptfs-utils-56-8.el5.ppc64.rpm
File outdated by:  RHBA-2011:1503
    MD5: 6dc83f0e6116bf638ba1eb983e6a9bed
ecryptfs-utils-devel-56-8.el5.ppc.rpm
File outdated by:  RHBA-2011:1503
    MD5: bc3a2ca69366fca26e8561d3465486fc
ecryptfs-utils-devel-56-8.el5.ppc64.rpm
File outdated by:  RHBA-2011:1503
    MD5: 331decfcc5b8cc1feb1279aa31842605
 
s390x:
ecryptfs-utils-56-8.el5.s390.rpm
File outdated by:  RHBA-2011:1503
    MD5: 47b40682167be6722f2a2ad4830ab1e7
ecryptfs-utils-56-8.el5.s390x.rpm
File outdated by:  RHBA-2011:1503
    MD5: c143436d48c70245702418a469b2e530
ecryptfs-utils-devel-56-8.el5.s390.rpm
File outdated by:  RHBA-2011:1503
    MD5: d1a6b8f363afcef4a6fefe6d7aa6300c
ecryptfs-utils-devel-56-8.el5.s390x.rpm
File outdated by:  RHBA-2011:1503
    MD5: 0bfa9003fa8ff0ad29cf9f5333856978
 
x86_64:
ecryptfs-utils-56-8.el5.i386.rpm
File outdated by:  RHBA-2011:1503
    MD5: b95600436744b391cfc4b85d6bb088fc
ecryptfs-utils-56-8.el5.x86_64.rpm
File outdated by:  RHBA-2011:1503
    MD5: 9822a1031668b4473719dd3a58689a3f
ecryptfs-utils-devel-56-8.el5.i386.rpm
File outdated by:  RHBA-2011:1503
    MD5: 7f06831960dfa6783ab985bbee4c1571
ecryptfs-utils-devel-56-8.el5.x86_64.rpm
File outdated by:  RHBA-2011:1503
    MD5: ed9bf34441fec8105ad5d1f9a036ff42
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ecryptfs-utils-56-8.el5.src.rpm
File outdated by:  RHBA-2011:1503
    MD5: 13e6df4729cfaf4595953adae26633f9
 
IA-32:
ecryptfs-utils-56-8.el5.i386.rpm
File outdated by:  RHBA-2011:1503
    MD5: b95600436744b391cfc4b85d6bb088fc
 
x86_64:
ecryptfs-utils-56-8.el5.i386.rpm
File outdated by:  RHBA-2011:1503
    MD5: b95600436744b391cfc4b85d6bb088fc
ecryptfs-utils-56-8.el5.x86_64.rpm
File outdated by:  RHBA-2011:1503
    MD5: 9822a1031668b4473719dd3a58689a3f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

441494 - passwd_file does not work for key=passphrase
441822 - verbosity option of ecryptfs mount helper not recognized
449586 - RHEL5: update ecryptfs-utils to latest
467234 - openssl module reports invalid packet format error on file creation in ecryptfs filesystem



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/