Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 194289 - sys-fs/cryptsetup-luks-1.0.4-r3 luksOpen *** stack smashing detected ***
Summary: sys-fs/cryptsetup-luks-1.0.4-r3 luksOpen *** stack smashing detected ***
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: x86 Linux
: High normal
Assignee: Gentoo Linux bug wranglers
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2007-09-30 16:00 UTC by Victor Mataré
Modified: 2007-09-30 18:24 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Mataré 2007-09-30 16:00:33 UTC
sys-kernel/hardened-sources-2.6.20-r6
sys-fs/cryptsetup-luks-1.0.4-r3

All PAX systems are enabled.

# cryptsetup luksOpen /dev/md/d1p1 haufen
Enter LUKS passphrase:
key slot 0 unlocked.
*** stack smashing detected ***: cryptsetup - terminated
cryptsetup: stack smashing attack in function __crypt_luks_open - terminated
Report to http://bugs.gentoo.org/
Killed

Reproducible: Always

Steps to Reproduce:
# cryptsetup -c aes-lrw-benbi -s 384 luksFormat /dev/md/d1p1

WARNING!
========
This will overwrite data on /dev/md/d1p1 irrevocably.

Are you sure? (Type uppercase yes): YES
Enter LUKS passphrase:
Verify passphrase:
Command successful.

Actual Results:  
Everything working fine afterwards. Mapping is up and usable, only that message about stack smashing is frightening...


Important: The Problem only occurs with LRW. When using CBC instead, everything works fine.
Comment 1 Victor Mataré 2007-09-30 16:16:25 UTC
sys-fs/cryptsetup-1.0.5 (~x86) fixes this.
You might want to set it stable.