SRU Justification Impact: Soft linked file names can produce alarming warnings in dmesg (and are not actually encrypted, thereby leaking information)
Patch: http://kernel.ubuntu.com/git?p=ubuntu/ubuntu- jaunty.git;a=commit;h=a63b7d7beeaa1f8f33369cab6419831fa8991e40 Patch Description: When using filename encryption with eCryptfs, the value of the symlink in the lower filesystem is encrypted and stored as a Tag 70 packet. This results in a longer symlink target than if the target value wasn't encrypted. Test Case: dmesg flood stops ** Changed in: linux (Ubuntu Jaunty) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Jaunty) Milestone: None => jaunty-updates -- ecryptfs: Could not parse tag 70 packet from filename https://bugs.launchpad.net/bugs/357345 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
