- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0203 - Bug Fix Advisory
Synopsis
ecryptfs-utils bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ecryptfs-utils packages that fix a bug and add various enhancements
are now available.
Description
eCryptfs is a stacked, cryptographic file-system included in the Linux
kernel. It is transparent to the underlying file-system and provides
per-file granularity.
eCryptfs was first released as a Technology Preview for Red Hat Enterprise
Linux 5.2. These updated ecryptfs-utils packages have all been upgraded to
upstream version 56, which provides a number of bug fixes and enhancements
over the previous version. In addition, these packages provide a graphical
program to help configure and use eCryptfs. To start this program, run the
following command:
ecryptfs-mount-helper-gui
Important: the syntax of certain eCryptfs mount options has changed. Users
who were previously using the initial Technology Preview release of
ecryptfs-utils are advised to refer to the ecryptfs(7) manual page, and to
update any affected mount scripts and /etc/fstab entries for eCryptfs file
systems.
These updated ecryptfs-utils packages provide various enhancements,
including a mount helper and supporting libraries to perform key management
and mount functions.
In addition, these updated ecryptfs-utils packages fix a bug related to the
'verbosity' parameter of the mount.ecryptfs command. The option
'verbosity=0' was incorrectly passed as a parameter to /sbin/mount, which
resulted in the following message being logged to syslog:
"ecryptfs_parse_options: eCryptfs: unrecognized option 'verbosity=0'". In
these updated packages, the mount.encryptfs command no longer attempts to
pass this parameter to /sbin/mount, thus resolving the issue.
Users are advised to upgrade to these updated ecryptfs-utils packages,
which resolve this issue and add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 441494 - passwd_file does not work for key=passphrase
- BZ - 441822 - verbosity option of ecryptfs mount helper not recognized
- BZ - 449586 - RHEL5: update ecryptfs-utils to latest
- BZ - 467234 - openssl module reports invalid packet format error on file creation in ecryptfs filesystem
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ecryptfs-utils-56-8.el5.src.rpm | SHA-256: 2cbaf2339effecaf8d03d96ed2df96f1cb974eb9ded420953ab66be8ea21ce20 |
x86_64 | |
ecryptfs-utils-56-8.el5.i386.rpm | SHA-256: da15357336756a3a3612430461ca8e3f7f9ff9bf492c836fdf9bf68bb89941f2 |
ecryptfs-utils-56-8.el5.x86_64.rpm | SHA-256: 5c257ed9cfdaa756dfea13e3eb5d4de4b4432d83cab0e8c2ec3e140f5d95df28 |
ecryptfs-utils-devel-56-8.el5.i386.rpm | SHA-256: 60d174d07e4eaa1d682038a691701cf9a250827fc92fd6e075bf049f0a78b94c |
ecryptfs-utils-devel-56-8.el5.x86_64.rpm | SHA-256: e9c6f457fa5735506e500c229b245831034f187eef2e84dc642c12a739258f24 |
ia64 | |
ecryptfs-utils-56-8.el5.ia64.rpm | SHA-256: 26bcdbede85b8d4ad850e39c4d94652de9c102449cee0e3c3a1ef35e7edd535b |
ecryptfs-utils-devel-56-8.el5.ia64.rpm | SHA-256: 4baaa5d3f90eb31e01dd4941ff804d40b2e99393786459a0a99c2284aa525bc1 |
i386 | |
ecryptfs-utils-56-8.el5.i386.rpm | SHA-256: da15357336756a3a3612430461ca8e3f7f9ff9bf492c836fdf9bf68bb89941f2 |
ecryptfs-utils-devel-56-8.el5.i386.rpm | SHA-256: 60d174d07e4eaa1d682038a691701cf9a250827fc92fd6e075bf049f0a78b94c |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
ecryptfs-utils-56-8.el5.src.rpm | SHA-256: 2cbaf2339effecaf8d03d96ed2df96f1cb974eb9ded420953ab66be8ea21ce20 |
x86_64 | |
ecryptfs-utils-56-8.el5.i386.rpm | SHA-256: da15357336756a3a3612430461ca8e3f7f9ff9bf492c836fdf9bf68bb89941f2 |
ecryptfs-utils-56-8.el5.x86_64.rpm | SHA-256: 5c257ed9cfdaa756dfea13e3eb5d4de4b4432d83cab0e8c2ec3e140f5d95df28 |
ecryptfs-utils-devel-56-8.el5.i386.rpm | SHA-256: 60d174d07e4eaa1d682038a691701cf9a250827fc92fd6e075bf049f0a78b94c |
ecryptfs-utils-devel-56-8.el5.x86_64.rpm | SHA-256: e9c6f457fa5735506e500c229b245831034f187eef2e84dc642c12a739258f24 |
i386 | |
ecryptfs-utils-56-8.el5.i386.rpm | SHA-256: da15357336756a3a3612430461ca8e3f7f9ff9bf492c836fdf9bf68bb89941f2 |
ecryptfs-utils-devel-56-8.el5.i386.rpm | SHA-256: 60d174d07e4eaa1d682038a691701cf9a250827fc92fd6e075bf049f0a78b94c |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
ecryptfs-utils-56-8.el5.src.rpm | SHA-256: 2cbaf2339effecaf8d03d96ed2df96f1cb974eb9ded420953ab66be8ea21ce20 |
x86_64 | |
ecryptfs-utils-56-8.el5.i386.rpm | SHA-256: da15357336756a3a3612430461ca8e3f7f9ff9bf492c836fdf9bf68bb89941f2 |
ecryptfs-utils-56-8.el5.x86_64.rpm | SHA-256: 5c257ed9cfdaa756dfea13e3eb5d4de4b4432d83cab0e8c2ec3e140f5d95df28 |
i386 | |
ecryptfs-utils-56-8.el5.i386.rpm | SHA-256: da15357336756a3a3612430461ca8e3f7f9ff9bf492c836fdf9bf68bb89941f2 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
ecryptfs-utils-56-8.el5.src.rpm | SHA-256: 2cbaf2339effecaf8d03d96ed2df96f1cb974eb9ded420953ab66be8ea21ce20 |
s390x | |
ecryptfs-utils-56-8.el5.s390.rpm | SHA-256: 33c030834c4edaf75e0040e89eabb19ea6d4c03b96951b4aff44418852a5f9e7 |
ecryptfs-utils-56-8.el5.s390x.rpm | SHA-256: dc880ed4f7ee1603a297198878c8fa73edbd3d4e59fc7767e14d0d1771a9c4e9 |
ecryptfs-utils-devel-56-8.el5.s390.rpm | SHA-256: 5c139cae7b28438cd5c3a1d1a8a952df42db6e22145752ac1fbcc2208317de52 |
ecryptfs-utils-devel-56-8.el5.s390x.rpm | SHA-256: 36ec8cd74e3928018cd19d73ba03b986e1c1de61c3f897a51f2bf1dca65c5a34 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ecryptfs-utils-56-8.el5.src.rpm | SHA-256: 2cbaf2339effecaf8d03d96ed2df96f1cb974eb9ded420953ab66be8ea21ce20 |
ppc | |
ecryptfs-utils-56-8.el5.ppc.rpm | SHA-256: 953f744cc9936c2575dbcfcf2b0dbcf72ed7e017e688e5f2f3b180a73d37036e |
ecryptfs-utils-56-8.el5.ppc64.rpm | SHA-256: 3a46476c4b573d66a905a66b13d9d8b1170d382bd6f574dafc9461c9fbd6e7f4 |
ecryptfs-utils-devel-56-8.el5.ppc.rpm | SHA-256: 683f4d7b5c621f7ef19ceb5718cdfbbfec7d583b52362b37f947d5511e72d695 |
ecryptfs-utils-devel-56-8.el5.ppc64.rpm | SHA-256: 2b301788ba7d3146abaeed0abdd9a7f878eb2dc9f24df20473f8f05a45c285d8 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ecryptfs-utils-56-8.el5.src.rpm | SHA-256: 2cbaf2339effecaf8d03d96ed2df96f1cb974eb9ded420953ab66be8ea21ce20 |
x86_64 | |
ecryptfs-utils-56-8.el5.i386.rpm | SHA-256: da15357336756a3a3612430461ca8e3f7f9ff9bf492c836fdf9bf68bb89941f2 |
ecryptfs-utils-56-8.el5.x86_64.rpm | SHA-256: 5c257ed9cfdaa756dfea13e3eb5d4de4b4432d83cab0e8c2ec3e140f5d95df28 |
ecryptfs-utils-devel-56-8.el5.i386.rpm | SHA-256: 60d174d07e4eaa1d682038a691701cf9a250827fc92fd6e075bf049f0a78b94c |
ecryptfs-utils-devel-56-8.el5.x86_64.rpm | SHA-256: e9c6f457fa5735506e500c229b245831034f187eef2e84dc642c12a739258f24 |
i386 | |
ecryptfs-utils-56-8.el5.i386.rpm | SHA-256: da15357336756a3a3612430461ca8e3f7f9ff9bf492c836fdf9bf68bb89941f2 |
ecryptfs-utils-devel-56-8.el5.i386.rpm | SHA-256: 60d174d07e4eaa1d682038a691701cf9a250827fc92fd6e075bf049f0a78b94c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.