* SECURITY UPDATE: Information exposure via unencrypted swap partitions. The
swap partition was not configured to use encryption when GPT partitioning
was in use on NVMe and MMC drives.
- debian/patches/CVE-2016-6224.patch: Properly handle the formatting of
the path to swap partitions on NVMe and MMC drives so that they're
correctly marked as not to be automatically mounted by systemd. Based on
upstream patch from Jason Gerard DeRose. (LP: #1597154)
- debian/ecryptfs-utils.postinst: Fix any unencrypted GPT swap partitions
that have mistakenly remained marked as auto mount. This should only
modify the swap partitions on systems that ecryptfs-setup-swap has been
used on. (LP: #1447282, LP: #1597154)
- CVE-2016-6224
This bug was fixed in the package ecryptfs-utils - 111-0ubuntu2
---------------
ecryptfs-utils (111-0ubuntu2) yakkety; urgency=medium
* SECURITY UPDATE: Information exposure via unencrypted swap partitions. The patches/ CVE-2016- 6224.patch: Properly handle the formatting of ecryptfs- utils.postinst: Fix any unencrypted GPT swap partitions
swap partition was not configured to use encryption when GPT partitioning
was in use on NVMe and MMC drives.
- debian/
the path to swap partitions on NVMe and MMC drives so that they're
correctly marked as not to be automatically mounted by systemd. Based on
upstream patch from Jason Gerard DeRose. (LP: #1597154)
- debian/
that have mistakenly remained marked as auto mount. This should only
modify the swap partitions on systems that ecryptfs-setup-swap has been
used on. (LP: #1447282, LP: #1597154)
- CVE-2016-6224
-- Tyler Hicks <email address hidden> Thu, 14 Jul 2016 18:48:53 -0500