Re: Stack smashing detected durring cryptsetup luksOpen

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/06/2007 Marcin Garski wrote:
> During testing of various ciphers I have probably found some bug in 
> cryptsetup-luks. My box is Fedora 7 with cryptsetup-luks 1.0.3.
> 
> Steps to reproduce:
> 1. cryptsetup luksFormat -c aes-lrw-benbi -s 384 /dev/sdxx
> 2. cryptsetup luksOpen /dev/sdxx enc
> 
> 3. *** stack smashing detected ***: cryptsetup terminated

Hello Marcin,

I just tried to reproduce this bug with cryptsetup 1.0.5 on a
debian/unstable machine with kernel 2.6.21, but i wasn't successful:

# cryptsetup luksFormat -c aes-lrw-benbi -s 384 /dev/vg00/test

WARNING!
========
This will overwrite data on /dev/vg00/test irrevocably.

Are you sure? (Type uppercase yes): YES
Enter LUKS passphrase:
Verify passphrase:
Command successful.

# cryptsetup luksOpen /dev/vg00/test crypt_test
Enter LUKS passphrase:
key slot 0 unlocked.
Command successful.

Maybe you should try again with cryptsetup 1.0.5 and check your
kernel version.

greetings,
 jonas

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux