[pkg-cryptsetup-devel] Bug#985581: cryptsetup-bin: Interactive passphrases over 64-bytes long are not read correctly under kernel 5.10.20/5.11.3

Guilhem Moulin guilhem at debian.org
Sat Mar 20 11:29:59 GMT 2021


Package: cryptsetup-bin
Version: 2:2.3.4-2
Severity: important
Tags: upstream fixed-upstream
Control: fixed -1 2:2.3.5-1+exp1
Control: forwarded -1 https://gitlab.com/cryptsetup/cryptsetup/-/issues/627

From 2.3.5 release notes and <https://gitlab.com/cryptsetup/cryptsetup/-/merge_requests/148>:

    Some stable kernels (5.10.20/5.11.3) started to return buffer from
    terminal in partial buffers of maximal size 64 bytes.

    This breaks all passphrases longer than 64 characters entered
    through interactive input (for all crypto formats).

    (The problem is probably fixed in more recent kernels, but the
    read() call can always return a partial read here.)

-- 
Guilhem.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-cryptsetup-devel/attachments/20210320/a9602bad/attachment.sig>


More information about the pkg-cryptsetup-devel mailing list