SRU Justification

Impact: Soft linked file names can produce alarming warnings in dmesg
(and are not actually encrypted, thereby leaking information)

Patch: http://kernel.ubuntu.com/git?p=ubuntu/ubuntu-
jaunty.git;a=commit;h=a63b7d7beeaa1f8f33369cab6419831fa8991e40

Patch Description: When using filename encryption with eCryptfs, the
value of the symlink in the lower filesystem is encrypted and stored as
a Tag 70 packet. This results in a longer symlink target than if the
target value wasn't encrypted.

Test Case: dmesg flood stops

** Changed in: linux (Ubuntu Jaunty)
       Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Jaunty)
    Milestone: None => jaunty-updates

-- 
ecryptfs: Could not parse tag 70 packet from filename
https://bugs.launchpad.net/bugs/357345
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to