* SECURITY UPDATE: Mount passphrase wrapped with a default salt value
- debian/patches/CVE-2014-9687.patch: Generate a random salt when wrapping
the mount passphrase. If a user has a mount passphrase that was wrapped
using the default salt, their mount passphrase will be rewrapped using a
random salt when they log in with their password.
- debian/patches/CVE-2014-9687.patch: Create a temporary file when
creating a new wrapped-passphrase file and copy it to its final
destination after the file has been fully synced to disk (LP: #1020902)
- debian/rules: Set the executable bit on the wrap-unwrap.sh and
v1-to-v2-wrapped-passphrase.sh test scripts that were created by
wrapping-passphrase-salt.patch
- CVE-2014-9687
-- Tyler Hicks <email address hidden> Wed, 04 Mar 2015 16:38:14 -0600
This bug was fixed in the package ecryptfs-utils - 96-0ubuntu3.4
---------------
ecryptfs-utils (96-0ubuntu3.4) precise-security; urgency=medium
* SECURITY UPDATE: Mount passphrase wrapped with a default salt value patches/ CVE-2014- 9687.patch: Generate a random salt when wrapping patches/ CVE-2014- 9687.patch: Create a temporary file when to-v2-wrapped- passphrase. sh test scripts that were created by passphrase- salt.patch
- debian/
the mount passphrase. If a user has a mount passphrase that was wrapped
using the default salt, their mount passphrase will be rewrapped using a
random salt when they log in with their password.
- debian/
creating a new wrapped-passphrase file and copy it to its final
destination after the file has been fully synced to disk (LP: #1020902)
- debian/rules: Set the executable bit on the wrap-unwrap.sh and
v1-
wrapping-
- CVE-2014-9687
-- Tyler Hicks <email address hidden> Wed, 04 Mar 2015 16:38:14 -0600