[ Colin Ian King ]
* src/daemon/main.c:
- Static analysis with Clang's scan-build shows that we can potentially
overflow the input buffer if the input is equal or more than the buffer
size. Need to guard against this by:
1. Only reading in input_size - 1 chars
2. Checking earlier on to see if input_size is value to insure that we
read in at least 1 char
[ Tyler Hicks ]
* src/utils/mount.ecryptfs_private.c:
- Refuse to mount over non-standard filesystems. Mounting over
certain types filesystems is a red flag that the user is doing
something devious, such as mounting over the /proc/self symlink
target with malicious content in order to confuse programs that may
attempt to parse those files. (LP: #1530566)
This bug was fixed in the package ecryptfs-utils - 109-0ubuntu1
---------------
ecryptfs-utils (109-0ubuntu1) xenial; urgency=medium
[ Maikel ] ecryptfs- migrate- home.8: Fix typos in man page (LP: #1518787)
* doc/manpage/
[ Kylie McClain ] mount.ecryptfs. c, src/utils/ mount.ecryptfs_ private. c: Fix build
* src/utils/
issues on musl libc (LP: #1514625)
[ Colin Ian King ]
* src/daemon/main.c:
- Static analysis with Clang's scan-build shows that we can potentially
overflow the input buffer if the input is equal or more than the buffer
size. Need to guard against this by:
1. Only reading in input_size - 1 chars
2. Checking earlier on to see if input_size is value to insure that we
read in at least 1 char
[ Tyler Hicks ] mount.ecryptfs_ private. c:
* src/utils/
- Refuse to mount over non-standard filesystems. Mounting over
certain types filesystems is a red flag that the user is doing
something devious, such as mounting over the /proc/self symlink
target with malicious content in order to confuse programs that may
attempt to parse those files. (LP: #1530566)
[ Dustin Kirkland ]
* xenial
-- Dustin Kirkland <email address hidden> Fri, 22 Jan 2016 10:05:35 -0600