leakage in the installer
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ecryptfs-utils (Ubuntu) |
Fix Released
|
Critical
|
Dustin Kirkland | ||
Jaunty |
Fix Released
|
Critical
|
Dustin Kirkland |
Bug Description
Binary package hint: ecryptfs-utils
The mount passphrase is leaked in the Ubuntu installer logs, at /var/log/
This file is mode 0600:
-rw------- 1 syslog adm 347379 2009-06-04 11:00 /var/log/
However, it is written to the disk in the clear, and constitutes a leakage of the mount passphrase.
The upstream ecryptfs code (and Karmic) should be modified to support a flag to disable this printing, and the user-setup code should call ecryptfs-
As for Jaunty, I'm attach a patch to ecryptfs-utils that should be uploaded to jaunty-security. This patch uses sed to prune the offending lines out of /var/log/
Please advise on whatever additional disclosure mechanisms (if any) need to be invoked (CVE, USN, etc.).
:-Dustin
CVE References
Changed in ecryptfs-utils (Ubuntu): | |
assignee: | nobody → Dustin Kirkland (kirkland) |
importance: | Undecided → High |
milestone: | none → jaunty-updates |
status: | New → In Progress |
Changed in ecryptfs-utils (Ubuntu): | |
importance: | High → Critical |
Changed in ecryptfs-utils (Ubuntu Jaunty): | |
assignee: | nobody → Dustin Kirkland (kirkland) |
importance: | Undecided → Critical |
milestone: | none → jaunty-updates |
status: | New → In Progress |
visibility: | private → public |
This bug was fixed in the package ecryptfs-utils - 73-0ubuntu6.1
---------------
ecryptfs-utils (73-0ubuntu6.1) jaunty-security; urgency=low
* SECURITY UPDATE: mount passphrase recorded in install log (LP: #383650). ecryptfs- utils.postinst: prune private information from ecryptfs- setup-private: don't echo passphrase if running in
- debian/
installer log
- src/utils/
bootstrap mode
- CVE-2009-1296
-- Dustin Kirkland <email address hidden> Thu, 04 Jun 2009 11:29:58 -0500