Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 13 Jul 2016 01:38:52 -0500
From: Tyler Hicks <tyhicks@...onical.com>
To: oss-security@...ts.openwall.com
Subject: CVE Requests: Information exposure caused by ecryptfs-setup-swap
 failures

Hello - I'd like to request two CVEs. The flaws are in the
ecryptfs-setup-swap script that is provided by the upstream
ecryptfs-utils project. The script can be used to convert an existing,
unencrypted swap partition into a swap partition that is encrypted.
System admins may use this tool and the Ubuntu installer uses it when
the user opts into home directory encryption.

On systems using systemd 211 or newer and GPT partitioning, the
unencrypted swap partition was being automatically activated during boot
and the encrypted swap was not used. This was due to ecryptfs-setup-swap
not marking the swap partition as "no-auto", as defined by the
Discoverable Partitions Spec:


https://www.freedesktop.org/wiki/Specifications/DiscoverablePartitionsSpec/

Details of the two issues needing CVEs:

ecryptfs-setup-swap improperly configures encrypted swap when using GPT
partitioning
Bug: https://launchpad.net/bugs/1447282
Fix: https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857
(Please ignore the inaccurate commit message for commit 857)

ecryptfs-setup-swap improperly configures encrypted swap when using GPT
partitioning on a NVMe or MMC drive. This bug is due to an incomplete
fix for bug 1447282.
Bug: https://launchpad.net/bugs/1597154
Fix: https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882

Tyler



Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.