There is no security hole here. The only thing that ureadahead does is call readahead() on certain files to tell the kernel to cache these files for later use. I'm not certain how ecryptfs works, but I'm fairly certain there's no security weakness here. For instance, it's likely that ureadahead reads the encrypted information in to memory for later decryption when you log in or something.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/782646 Title: ureadahead creates unwanted pack files (tmpfs, encrypted partitions) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ureadahead/+bug/782646/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs