Debian Sanctuary Project
Summary
Bugs of task disk-encryption
Total bugs: 68
Open bugs: 65
Fixed bugs: 3
Links to other tasks Legend
SeverityDependentSuggested
critical 0 0
grave 0 0
serious 0 0
important 6 0
normal 16 0
minor 6 0
wishlist 37 0

Summary bugs page of task Disk encryption

Immediately looking into bugs of the dependencies of this task is advised (252)*

Open bugs in dependent packages

6 important, 16 normal, 6 minor, 37 wishlist
509068 cryptsetup: improving passdev
509070 cryptsetup: readd timeout support wontfix
515294 cryptsetup: Configurable passphrase prompt
537842 Accessibility (beep) support in cryptdisks/cryptroot
688735 Some strings need to be set up for i18n
704007 cryptsetup: make mountpoint used by passdev configurable
707591 cryptsetup: speed up initramfs by reading the passphrase early
714333 cryptsetup: several issues and questions all over the place
723860 plymouth only speeks english
728197 Low entropy for encrypted swap partition
762297 cryptsetup: fails to create tmp filesystem due to false positive from blkid wontfix
763294 cryptsetup: askpass should implement keyboard randomisation as a countermeasure to keyloggers
772945 cryptsetup: please provide means to localize cryptroot messages
774647 can't a use key file stored on an encrypted rootfs to unlock the resume device at initramfs stage bookworm, bullseye, buster, sid, stretch, trixie
781468 cryptsetup depends on udev in shutdown initramfs
781685 cryptsetup: prompt for password if device exists, otherwise don't block for it to appear
799469 password prompt invisible with kdump or kexec
820888 cryptsetup: initramfs cryptroot zfs support
826144 cryptsetup/tab multi-device handling and parallel device mapping
838001 cryptsetup does not support ZFS
850756 cryptsetup: Please save password to kernel keyring
856038 cryptsetup: clear error message before each password re-try
864647 cryptsetup: Patch to get cryptokey from external device (e.g. USB stick)
867850 cryptsetup: Feature Request: Parallel unlock via keyfile or password on boot
901795 cryptsetup-initramfs: please provide documented shell functions to validate/sanitize cryptroot entries in 3rd party hook files
902449 cryptsetup-initramfs: auto-detection of zfs pool(s)
913183 "/etc/cryptsetup-initramfs/conf-hook", add the possibility to include at least one header file
916374 cryptsetup-initramfs: keyscript=decrypt_gnupg-sc yields a debug shell if the first smartcard can't unlock the key
924560 cryptsetup luksOpen requires 1GB of RAM in the default configuration wontfix
932437 LUKS formatting of a 16 MB (sic!) device is possible, open not upstream
932891 cryptsetup: WARNING: Couldn't determine root device on ZFS error
933836 cryptsetup-initramfs: hook files should give hints about missing packages to install
945006 cryptsetup: missing keyutils package
945783 decrypt_gnupg-sc: Add possibility to use password fallback
949888 cryptsetup-initramfs: cryptroot hook doesn't recognize devices with authenticated encryption
961671 Improve documentation for crypttab mapping renaming
969286 cryptsetup-suspend: Make it possible to exclude key from initramfs
970224 cryptsetup-suspend: suspending after resume requires unlocking cryptsetup
978642 Wipe LUKS Disk Encryption Key for Root Disk from RAM during Shutdown to defeat Cold Boot Attacks from Initial Ramdisk (initramfs-tools or dracut) security
981405 man crypttab file conflict with systemd
991727 cryptsetup: insserv: FATAL: service cryptdisks-early has to be enabled to use service cryptdisks
994028 cryptsetup: manpage improvements
994562 cryptsetup: consider exit statuses of keyscripts patch
994610 cryptsetup: creation/cleanup of /etc/crypttab wontfix
994682 cryptsetup-initramfs: Poweroff timeout for cryptroot
999731 cryptsetup-suspend: fails to wake up screen after suspend moreinfo
1000540 cryptsetup-suspend: does not resume with GPG keyfile, smartcard and gnupg-sc
1008503 cryptsetup-initramfs: Handle absolute keyfile path for derived key in cryptroot hook patch
1023700 cryptsetup: Option fido2-device unknown
1028907 cryptsetup: initramfs hook can't handle xchacha20,aes-adantium-plain64
1031198 cryptsetup: autopkgtests fail on Ubuntu patch
1031254 cryptsetup: unable to boot rootfs from luks via tpm (cryptsetup unknown option tpm2-device tpm2-pin)
1032734 Argon2 memory cost is not future proof and might OOM on dist-upgrade on memory-constrained systems upstream
1033551 cryptsetup-bin: `cryptsetup -v isLuks` produces misleading output when the device isn't LUKS upstream
1034695 cryptsetup: If decrypt_keyctl fails, pass password to cryptsetup anyway patch
1034730 cryptsetup-initramfs doesn't include cryptsetup-token binaries and libraries
1034767 cryptsetup: askpass goes to 100% CPU utilisation when it's terminal HUPs
1037973 cryptsetup: option 'tcrypt-system' in crypttab is unknown
1052290 cryptsetup: askpass prompt invisible when kernel cmdline has ‘debug’ flag set
1053900 cryptsetup: Support multiple OpenPGP SmartCards in "decrypt_gnupg-sc"
1055024 cryptsetup-initramfs changes crypttab entries order when generating initramfs d-i, upstream
1056577 suspend-to-disk is broken after upgrade Debian 11 --> 12 moreinfo, unreproducible
1065073 cryptsetup: Make the information about changes of default cypher and hash in 2.7.0 more visible
1065801 cryptsetup: Crypttab man pages does not list option _netdev which is required for Network based unlocking via Tang
1069777 initramfs-tools: Bug/feature request: better handling of /etc/crypttab not ending in new line character

Open bugs in suggested packages

Done bugs

1068848 cryptsetup: Fails to unlock the filesystem with missing libgcc_s.so.1
1068849 cryptsetup: Fails to unlock the filesystem with missing libgcc_s.so.1
1070257 cryptsetup: cryptroot-unlock re licensed
*To estimate the overall status of the packages in the dependencies of a metapackage a weighted severity is calculated. Done bugs are ignored and bugs in dependent and recommended packages are weighted by factor three compared to suggested packages. Release critical bugs have a much larger weight than important, while the contribution of normal bugs is even smaller and minor bugs have a very small weight. Wishlist bugs are ignored in this calculation. The resulting sum is compared to some boundaries to find a verbal form. The actual numbers need some adjustment to make real sense - this evaluation method is in testing phase.
The severities of bugs are weighted as follows:
critical10
grave10
serious10
important5
normal3
minor1
wishlist0
Last update: Mon, 20 May 2024 04:13:31 -0000