[pkg-cryptsetup-devel] Bug#985581: cryptsetup-bin: Interactive passphrases over 64-bytes long are not read correctly under kernel 5.10.20/5.11.3
Guilhem Moulin
guilhem at debian.org
Sat Mar 20 11:29:59 GMT 2021
Package: cryptsetup-bin
Version: 2:2.3.4-2
Severity: important
Tags: upstream fixed-upstream
Control: fixed -1 2:2.3.5-1+exp1
Control: forwarded -1 https://gitlab.com/cryptsetup/cryptsetup/-/issues/627
From 2.3.5 release notes and <https://gitlab.com/cryptsetup/cryptsetup/-/merge_requests/148>:
Some stable kernels (5.10.20/5.11.3) started to return buffer from
terminal in partial buffers of maximal size 64 bytes.
This breaks all passphrases longer than 64 characters entered
through interactive input (for all crypto formats).
(The problem is probably fixed in more recent kernels, but the
read() call can always return a partial read here.)
--
Guilhem.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-cryptsetup-devel/attachments/20210320/a9602bad/attachment.sig>
More information about the pkg-cryptsetup-devel
mailing list