There is no security hole here. The only thing that ureadahead does is
call readahead() on certain files to tell the kernel to cache these
files for later use. I'm not certain how ecryptfs works, but I'm fairly
certain there's no security weakness here. For instance, it's likely
that ureadahead reads the encrypted information in to memory for later
decryption when you log in or something.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/782646

Title:
  ureadahead creates unwanted pack files (tmpfs, encrypted partitions)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ureadahead/+bug/782646/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to