Skip to navigation

Bug Fix Advisory ecryptfs-utils bug fix update

Advisory: RHBA-2011:1503-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated ecryptfs-utils packages that fix several bugs are now available for Red
Hat Enterprise Linux 5.

eCryptfs is a stacked, cryptographic file system. It is transparent to the
underlying file system and provides per-file granularity.

eCryptfs is released as a Technology Preview for Red Hat Enterprise Linux 5.8.

These updated ecryptfs-utils packages provide fixes for the following bugs:

* Previously, the eCryptfs daemon, ecryptfsd, failed to start if the ecryptfs
kernel module had not already created the files necessary for user space
communication under the /dev/ and /dev/misc/ directories, and "No such file or
directory" messages were logged. This update avoids this race condition by
ensuring that the ecryptfsd daemon waits and then attempts to start again if it
discovers that the requisite files have not yet been created. (BZ#554740)

* Prior to this update ecryptfs did not correctly handle the salt option
together with the password file. As a result mounting of the encrypted file
system would fail and the error, "Bad address", would be displayed. With this
update ecryptfs correctly handles the salt option and mounting of the encrypted
file system using eCryptfs no longer fails. (BZ#553629)

All users of ecryptfs-utils are advised to upgrade to these updated packages,
which fix these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ecryptfs-utils-75-8.el5.src.rpm     MD5: 53d531f5d9d07b48d6cafd5808940fe1
SHA-256: 0f4df5a99b9bc20ce829e472f91c1769b99fb5457277b8763b323f6402856c8e
 
IA-32:
ecryptfs-utils-devel-75-8.el5.i386.rpm     MD5: aa3325e44b3b1b94d61bee8df1ccc629
SHA-256: 6b97dc3bf143fa3019a9755fed855ed0afbf423d491e896de8bc00f065aeb19f
 
x86_64:
ecryptfs-utils-devel-75-8.el5.i386.rpm     MD5: aa3325e44b3b1b94d61bee8df1ccc629
SHA-256: 6b97dc3bf143fa3019a9755fed855ed0afbf423d491e896de8bc00f065aeb19f
ecryptfs-utils-devel-75-8.el5.x86_64.rpm     MD5: cba0c8081c13138efe0760f95fb56bb4
SHA-256: 4cfa726f00067a8ee85392e44c79455a7126c672f5a0788f2d4ce0213957791f
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ecryptfs-utils-75-8.el5.src.rpm     MD5: 53d531f5d9d07b48d6cafd5808940fe1
SHA-256: 0f4df5a99b9bc20ce829e472f91c1769b99fb5457277b8763b323f6402856c8e
 
IA-32:
ecryptfs-utils-75-8.el5.i386.rpm     MD5: bd96f2a8d3195848a8c87e3bc1db2440
SHA-256: 8546bd8a8c82d0c1d255b5aa18a16fe14621050ed96a160e6b89710ea40104dd
ecryptfs-utils-devel-75-8.el5.i386.rpm     MD5: aa3325e44b3b1b94d61bee8df1ccc629
SHA-256: 6b97dc3bf143fa3019a9755fed855ed0afbf423d491e896de8bc00f065aeb19f
ecryptfs-utils-gui-75-8.el5.i386.rpm     MD5: d272df9fd46cdaabde749f06f25bd69b
SHA-256: 91c13463023f5b70e00ffff7dc6e5f75087c0f000536d0e9eb9adcbf648303e8
 
IA-64:
ecryptfs-utils-75-8.el5.ia64.rpm     MD5: bfd329b0b24a02c49bd567fa675cf5df
SHA-256: b02cc9da8d589192ed9ec61e6797f88f9532fbf135a1f4811bf5ccf5a2b1c8f8
ecryptfs-utils-devel-75-8.el5.ia64.rpm     MD5: 58b413df2645b116640d71ae59df5196
SHA-256: dba2479b13b41468efc36d1f8ce0164e2774460695ca657fa894360a662a61eb
ecryptfs-utils-gui-75-8.el5.ia64.rpm     MD5: f3e524c088db36013c73f8831755f970
SHA-256: 9b212b2a76ef5bbf61f09e39be69dd7131165672ae5a294f43d8cb94b58a285c
 
PPC:
ecryptfs-utils-75-8.el5.ppc.rpm     MD5: 400504cda144d74a385d4f443ceebb54
SHA-256: 76904818f677feb2ea9d8073bc40c17e346382d3c9dbefb6c0b9f17729940c73
ecryptfs-utils-75-8.el5.ppc64.rpm     MD5: a71159d417d71d94106dac955af4488c
SHA-256: 9e4f95f2ede1895c09e0a08e6dbaf27b880da6a95f389f63c15a6b7ddf136865
ecryptfs-utils-devel-75-8.el5.ppc.rpm     MD5: 02c92274b7efc3054c0622ad7c922ca0
SHA-256: 6cd8d40e8ab3886e5c69db616d6b9f15ec391d66002d3a3ca40ff31456225d26
ecryptfs-utils-devel-75-8.el5.ppc64.rpm     MD5: 9ccbfbdd3ed2460078fff7236122ec5a
SHA-256: 1ba879d53d0076312f427f56c529e07d4e3e6bba643772929d12a37665ff6ee8
ecryptfs-utils-gui-75-8.el5.ppc.rpm     MD5: 8bc435fc90151b665896c2cd1b963ad4
SHA-256: 279751fc8bab41d3c00789b31b8c0e1f1a3d9b5e79cc99b0c9bde8256a6a4233
 
s390x:
ecryptfs-utils-75-8.el5.s390.rpm     MD5: b17e1e5a5fc7d5e4afee650516fa5e15
SHA-256: 69b9df379062ca278b90ba598b2bd326290100482903f5ad588b9c1bba2c1f17
ecryptfs-utils-75-8.el5.s390x.rpm     MD5: ffbaef10dc50696d45d25fef9022f31d
SHA-256: 74cdfe429f1d0fb46c1706d7857f93c697e6cefe460daef38df062501148de6d
ecryptfs-utils-devel-75-8.el5.s390.rpm     MD5: 51be2aa7b8315d01b6a8d405fe6ffac5
SHA-256: 5ab67476076375677b337c470c8d7d00ba45c20c6fcaa83ef9fbc4a3701068f1
ecryptfs-utils-devel-75-8.el5.s390x.rpm     MD5: e2bcf9ff4e588ac3ecd50c4d7ce77cd0
SHA-256: 18c16cb9c86ac34280aea073065a4ae299e3730d3580a6b90f3ca0219c3ac0af
ecryptfs-utils-gui-75-8.el5.s390x.rpm     MD5: 75d268545dde3c969a0f112964bc6e25
SHA-256: a4b42f5dae84d34f637248209bd8e0799e9abd85bfa409953ee7e1e7492b12f0
 
x86_64:
ecryptfs-utils-75-8.el5.i386.rpm     MD5: bd96f2a8d3195848a8c87e3bc1db2440
SHA-256: 8546bd8a8c82d0c1d255b5aa18a16fe14621050ed96a160e6b89710ea40104dd
ecryptfs-utils-75-8.el5.x86_64.rpm     MD5: 39824c0012bee194d0772cc6ed8e45a0
SHA-256: 5026bc90dd6800e451bee916104844e1850305e1af5c76782e3b779623be3896
ecryptfs-utils-devel-75-8.el5.i386.rpm     MD5: aa3325e44b3b1b94d61bee8df1ccc629
SHA-256: 6b97dc3bf143fa3019a9755fed855ed0afbf423d491e896de8bc00f065aeb19f
ecryptfs-utils-devel-75-8.el5.x86_64.rpm     MD5: cba0c8081c13138efe0760f95fb56bb4
SHA-256: 4cfa726f00067a8ee85392e44c79455a7126c672f5a0788f2d4ce0213957791f
ecryptfs-utils-gui-75-8.el5.x86_64.rpm     MD5: bcf992949e6752818d29c9283f143ce8
SHA-256: 3cba0570cb5b625bad086d74e4c2744312b2d4057307c5c799fa86c3d8d88c98
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ecryptfs-utils-75-8.el5.src.rpm     MD5: 53d531f5d9d07b48d6cafd5808940fe1
SHA-256: 0f4df5a99b9bc20ce829e472f91c1769b99fb5457277b8763b323f6402856c8e
 
IA-32:
ecryptfs-utils-75-8.el5.i386.rpm     MD5: bd96f2a8d3195848a8c87e3bc1db2440
SHA-256: 8546bd8a8c82d0c1d255b5aa18a16fe14621050ed96a160e6b89710ea40104dd
ecryptfs-utils-gui-75-8.el5.i386.rpm     MD5: d272df9fd46cdaabde749f06f25bd69b
SHA-256: 91c13463023f5b70e00ffff7dc6e5f75087c0f000536d0e9eb9adcbf648303e8
 
x86_64:
ecryptfs-utils-75-8.el5.i386.rpm     MD5: bd96f2a8d3195848a8c87e3bc1db2440
SHA-256: 8546bd8a8c82d0c1d255b5aa18a16fe14621050ed96a160e6b89710ea40104dd
ecryptfs-utils-75-8.el5.x86_64.rpm     MD5: 39824c0012bee194d0772cc6ed8e45a0
SHA-256: 5026bc90dd6800e451bee916104844e1850305e1af5c76782e3b779623be3896
ecryptfs-utils-gui-75-8.el5.x86_64.rpm     MD5: bcf992949e6752818d29c9283f143ce8
SHA-256: 3cba0570cb5b625bad086d74e4c2744312b2d4057307c5c799fa86c3d8d88c98
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

553629 - when using passwd_file together with salt option mount of ecryptfs fails
554740 - lazy /dev files creation on ecryptfs module load prevents ecryptfsd daemon to start



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/