[ubuntu/hirsute-proposed] cryptsetup 2:2.3.4-1ubuntu1 (Accepted)
Michael Hudson-Doyle
michael.hudson at ubuntu.com
Tue Nov 10 21:08:14 UTC 2020
cryptsetup (2:2.3.4-1ubuntu1) hirsute; urgency=medium
* Merge with Debian unstable. Remaining changes:
- debian/control:
+ Recommend plymouth.
+ Depend on busybox-initramfs instead of busybox | busybox-static.
- Fix cryptroot-unlock for busybox compatibility.
- Fix warning and error when running on ZFS on root: (LP #1830110)
- d/functions: Return an empty devno for ZFS devices as they don't have
major:minor device numbers.
- d/initramfs/hooks/cryptroot: Ignore and don't print an error message when
devices don't have a devno.
Submitted to debian upstream as bug #902449.
- debian/patches/decrease_memlock_ulimit.patch
Fixed FTBFS due a restrict environment in the new Bionic Builder (LP #1891473)
tests/luks2-validation.test, tests/compat-test, tests/tcrypt-compat-test.
- Thanks Guilherme G. Piccoli.
- Introduce retry logic for external invocations after mdadm (LP #1879980)
- Currently, if an encrypted rootfs is configured on top of a MD RAID1
array and such array gets degraded (e.g., a member is removed/failed)
the cryptsetup scripts cannot mount the rootfs, and the boot fails.
We fix that issue here by allowing the cryptroot script to be re-run
by initramfs-tools/local-block stage, as mdadm can activate degraded
arrays at that stage.
There is an initramfs-tools counter-part for this fix, but alone the
cryptsetup portion is harmless.
- d/cryptsetup-initramfs.install: ship the new local-bottom script.
- d/functions: declare variables for local-top|block|bottom scripts
(flag that local-block is running and external invocation counter.)
- d/i/s/local-block/cryptroot: set flag that local-block is running.
- d/i/s/local-bottom/cryptroot: clean up the flag and counter files.
- d/i/s/local-top/cryptroot: change the logic from just waiting 180
seconds to waiting 5 seconds first, then allowing initramfs-tools
to run mdadm (to activate degraded arrays) and call back at least
30 times/seconds more.
* Dropped changes:
- Included in new upstream version:
- SECURITY UPDATE: Out-of-bounds write
- debian/patches/CVE-2020-14382-*.patch: check segment gaps regardless of
heap space in lib/luks2/luks2_json_metadata.c.
- CVE-2020-14382
- included in Debian:
- debian/cryptsetup-bin.install:
- Fix FTBFS due to dh_missing detecting crypsetup.conf in debian/tmp where
it was installed from ./scripts/crypsetup.conf.
- debian/rules:
- fix FTBFS on riscv64 adding --with-tmpfilesdir to ensure all archs, even
without systemd knows how to ship cryptsetup.conf
cryptsetup (2:2.3.4-1) unstable; urgency=high
* New upstream bugfix release, including fix for CVE-2020-14382:
possible out-of-bounds memory write while validating LUKS2 data
segments metadata on 32-bits platforms. (Closes: #969471)
cryptsetup (2:2.3.3-2) unstable; urgency=medium
[ Helmut Grohne ]
* d/control: Annotate Build-Depends with <!nocheck>. (Closes: #964092)
[ Guilhem Moulin ]
* d/rules: Build with `--with-tmpfilesdir` to force installing
usr/lib/tmpfiles.d/cryptsetup.conf instead of picking the source from
scripts/cryptsetup.conf. This fixes FTBS in environments containing
systemd. (Closes: #968250)
* Add 'bitlk' flag in crypttab(5) to force detection of Windows BitLocker
volumes. (Closes: #967853)
Date: Tue, 10 Nov 2020 10:37:25 +1300
Changed-By: Michael Hudson-Doyle <michael.hudson at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/cryptsetup/2:2.3.4-1ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 10 Nov 2020 10:37:25 +1300
Source: cryptsetup
Architecture: source
Version: 2:2.3.4-1ubuntu1
Distribution: hirsute
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Michael Hudson-Doyle <michael.hudson at ubuntu.com>
Closes: 964092 967853 968250 969471
Changes:
cryptsetup (2:2.3.4-1ubuntu1) hirsute; urgency=medium
.
* Merge with Debian unstable. Remaining changes:
- debian/control:
+ Recommend plymouth.
+ Depend on busybox-initramfs instead of busybox | busybox-static.
- Fix cryptroot-unlock for busybox compatibility.
- Fix warning and error when running on ZFS on root: (LP #1830110)
- d/functions: Return an empty devno for ZFS devices as they don't have
major:minor device numbers.
- d/initramfs/hooks/cryptroot: Ignore and don't print an error message when
devices don't have a devno.
Submitted to debian upstream as bug #902449.
- debian/patches/decrease_memlock_ulimit.patch
Fixed FTBFS due a restrict environment in the new Bionic Builder (LP #1891473)
tests/luks2-validation.test, tests/compat-test, tests/tcrypt-compat-test.
- Thanks Guilherme G. Piccoli.
- Introduce retry logic for external invocations after mdadm (LP #1879980)
- Currently, if an encrypted rootfs is configured on top of a MD RAID1
array and such array gets degraded (e.g., a member is removed/failed)
the cryptsetup scripts cannot mount the rootfs, and the boot fails.
We fix that issue here by allowing the cryptroot script to be re-run
by initramfs-tools/local-block stage, as mdadm can activate degraded
arrays at that stage.
There is an initramfs-tools counter-part for this fix, but alone the
cryptsetup portion is harmless.
- d/cryptsetup-initramfs.install: ship the new local-bottom script.
- d/functions: declare variables for local-top|block|bottom scripts
(flag that local-block is running and external invocation counter.)
- d/i/s/local-block/cryptroot: set flag that local-block is running.
- d/i/s/local-bottom/cryptroot: clean up the flag and counter files.
- d/i/s/local-top/cryptroot: change the logic from just waiting 180
seconds to waiting 5 seconds first, then allowing initramfs-tools
to run mdadm (to activate degraded arrays) and call back at least
30 times/seconds more.
* Dropped changes:
- Included in new upstream version:
- SECURITY UPDATE: Out-of-bounds write
- debian/patches/CVE-2020-14382-*.patch: check segment gaps regardless of
heap space in lib/luks2/luks2_json_metadata.c.
- CVE-2020-14382
- included in Debian:
- debian/cryptsetup-bin.install:
- Fix FTBFS due to dh_missing detecting crypsetup.conf in debian/tmp where
it was installed from ./scripts/crypsetup.conf.
- debian/rules:
- fix FTBFS on riscv64 adding --with-tmpfilesdir to ensure all archs, even
without systemd knows how to ship cryptsetup.conf
.
cryptsetup (2:2.3.4-1) unstable; urgency=high
.
* New upstream bugfix release, including fix for CVE-2020-14382:
possible out-of-bounds memory write while validating LUKS2 data
segments metadata on 32-bits platforms. (Closes: #969471)
.
cryptsetup (2:2.3.3-2) unstable; urgency=medium
.
[ Helmut Grohne ]
* d/control: Annotate Build-Depends with <!nocheck>. (Closes: #964092)
.
[ Guilhem Moulin ]
* d/rules: Build with `--with-tmpfilesdir` to force installing
usr/lib/tmpfiles.d/cryptsetup.conf instead of picking the source from
scripts/cryptsetup.conf. This fixes FTBS in environments containing
systemd. (Closes: #968250)
* Add 'bitlk' flag in crypttab(5) to force detection of Windows BitLocker
volumes. (Closes: #967853)
Checksums-Sha1:
ba59609ab140500ce4515fdf6c80930016f04998 2972 cryptsetup_2.3.4-1ubuntu1.dsc
d8e220f1a4939e6ce6c67bf5082c16de7693ad49 11239076 cryptsetup_2.3.4.orig.tar.gz
795a5222bb69256d98856f9f6cfc13022b7f7fb0 126572 cryptsetup_2.3.4-1ubuntu1.debian.tar.xz
00d3871de37ca9a2bcdd974e9be4ac47fe25a499 7358 cryptsetup_2.3.4-1ubuntu1_source.buildinfo
Checksums-Sha256:
1a690cefbc636cd135859d0ed702b4e154e4a9a90c37f69153ca260a7a9e4576 2972 cryptsetup_2.3.4-1ubuntu1.dsc
b45c0f2038e48ed5f68e7ee2e3e38089d8b5c930fcc0eeff5a8583943fc39a74 11239076 cryptsetup_2.3.4.orig.tar.gz
b3884b693d26871c2eae268828a8d0960c017c74caf5c982aef135528b28b8c1 126572 cryptsetup_2.3.4-1ubuntu1.debian.tar.xz
b8a6d260ef35ac4a3a0bff5ebc68d67d86354e79b3fddcdf4af8175e079f538f 7358 cryptsetup_2.3.4-1ubuntu1_source.buildinfo
Files:
54cea15f4432815350b4b2e841a199c4 2972 admin optional cryptsetup_2.3.4-1ubuntu1.dsc
ae2d275f9e97fd973c77f1c3b7d6c687 11239076 admin optional cryptsetup_2.3.4.orig.tar.gz
38ceae073d112c65a2a6d254bf15c69d 126572 admin optional cryptsetup_2.3.4-1ubuntu1.debian.tar.xz
6ce88273bace6a8c7fc782560de5a094 7358 admin optional cryptsetup_2.3.4-1ubuntu1_source.buildinfo
Original-Maintainer: Debian Cryptsetup Team <pkg-cryptsetup-devel at alioth-lists.debian.net>
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEiiBE+E9xaoW3f/djEd9ClMyjmJMFAl+rAPEACgkQEd9ClMyj
mJPXMA//Z/dqcfV/Gg+ThezStPpiaMCRj00mQDTPKH19nJnGoLmo8Y5vONdLRiat
ON8ZKboEnxIlj6IEsrKIG2wyHwdLLtVCtJheyxbnaKk8kMUvUL1njI2vE0U3HFEy
6aEv2HY2SzrJhG0E729ZeEiuFsP6krdm/OyGMqUisAJG1UA/dQl+YoxOhJInmfF4
OPzaq2BTnqleZpT+zbQUGfVeU61MUbAIITDXLHf0zaIv2qiZI84SJ8wBVxAAHP8N
uunvwOuEVnMuN1UKYiNqVOeSTDbFYGuj8dW4QzImoEa1xSKCkWywD5lcopvK4BWB
BBAALClVuNSoNn0zhJalwQV9ypaqx5fpyA+nRZ2NjK/b7aWwoNsMvOGZqmf71D4c
ur9nuzsPOv1Sc3wWEYZI7g9YsYTosI7Kh0HJ8ZD/4mjym6u0OzcsrOL1fdK6m3d+
uybbxWwNQt4gJWXDAh6OSzWQyUELkt+44y2NcsCnWrOGBDU/ctRVVx/2RF2ZmefU
mo60EdCwMskSyDrOc8Eho4ReC4R9zPlyDjcQ0jdmfTa9DD0Q2DN7mZAQDfXbk7gB
t8y2SwsH9euA+hYCg1AdBO+u2U1stvJrhXzZjw2HBujSpdzV8bH5qEvyfapM0x4g
GuGdaNRNt5sTzo/HWWxjjs0oD3TgZ8+Ga+RxK833bsCAcYs5YN4=
=bn+1
-----END PGP SIGNATURE-----
More information about the Hirsute-changes
mailing list