This bug was fixed in the package ecryptfs-utils - 111-0ubuntu1.1
---------------
ecryptfs-utils (111-0ubuntu1.1) xenial-security; urgency=medium
* SECURITY UPDATE: Information exposure via unencrypted swap partitions. The
swap partition was not configured to use encryption when GPT partitioning
was in use on NVMe and MMC drives.
- debian/patches/set-up-encrypted-swap-on-nvme-and-mmc.patch: Properly
handle the formatting of the path to swap partitions on NVMe and MMC
drives so that they're correctly marked as not to be automatically
mounted by systemd. Based on upstream patch from Jason Gerard DeRose.
(LP: #1597154)
- debian/ecryptfs-utils.postinst: Fix any unencrypted GPT swap partitions
that have mistakenly remained marked as auto mount. This should only
modify the swap partitions on systems that ecryptfs-setup-swap has been
used on. (LP: #1447282, LP: #1597154)
- CVE not yet assigned
-- Tyler Hicks <[email protected]> Wed, 13 Jul 2016 00:36:59 -0500
** Changed in: ecryptfs-utils (Ubuntu Xenial)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1447282
Title:
Does not use encrypted swap when using GPT partitioning + encrypted
home directory (ecryptfs)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ecryptfs/+bug/1447282/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs