Skip to content

Commit c7ae50f

Browse files
committed
Add 2.8.3 Release notes.
1 parent 55d4022 commit c7ae50f

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

docs/v2.8.3-ReleaseNotes

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
Cryptsetup 2.8.3 Release Notes
2+
==============================
3+
Stable bug-fix release with minor extensions.
4+
5+
All users of cryptsetup 2.8.x must upgrade to this version.
6+
7+
Changes since version 2.8.2
8+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
9+
10+
* BITLK: Fix for BitLocker metadata validation on big-endian systems.
11+
12+
Changes since version 2.8.1
13+
~~~~~~~~~~~~~~~~~~~~~~~~~~~
14+
15+
* Fix cryptsetup LUKS2 status for HW inline integrity device.
16+
Cryptsetup status did not print the inline flag if the underlying device with
17+
HW integrity tags was used.
18+
19+
* Fix LUKS2 format with detached header and data device with HW integrity tags.
20+
21+
* Fix PBKDF serialization flag during device activation.
22+
The --serialize-memory-hard-pbkdf and CRYPT_ACTIVATE_SERIALIZE_MEMORY_HARD_PBKDF API flag
23+
is now properly supported again. This option is an optional workaround for situations where
24+
multiple devices are activated in parallel (e.g., systemd crypttab activation).
25+
26+
* BITLK: Add support for opening devices with Clear Key in BitLocker compatible mode.
27+
BitLocker devices that are not yet encrypted can contain a Clear Key that is not protected
28+
by a password. Cryptsetup can now map such devices and allow the user to access data on them.
29+
Note that while such a device is detected as BitLocker, it must be treated as an unencrypted
30+
device. Cryptsetup still does not allow mapping of partially encrypted BitLocker devices
31+
(those in the middle of the encryption process).
32+
33+
* BITLK: Harden metadata check by properly validating BitLocker metadata.
34+
BitLocker metadata store checksums and authentication tags to detect random or malicious
35+
manipulation. BITLK code now properly validates these and uses a backup metadata block
36+
if validation fails. Previously, only the first metadata block was used.
37+
38+
* Fix documentation to explicitly mention units for various API functions and in help messages.
39+
Note that due to compatibility reasons, cryptsetup arguments use key sizes in bits while
40+
integritysetup uses bytes.
41+
42+
* Fix handling of too-long labels and subsystem fields.
43+
LUKS2 labels are stored in the binary header area, which has a limited size.
44+
Cryptsetup no longer silently truncates too-long labels; it prints an error instead.
45+
46+
* Optimize reencryption to not repeatedly test access to the device.
47+
48+
* Allow to use PHMAC (protected HMAC) with integritysetup and cryptsetup.
49+
PHMAC is used by S390 mainframes. Support was added in Linux kernel 6.17. Configuration requires
50+
steps using s390-tools; once that's done, it can be handled as a common LUKS2 or integrity device.
51+
52+
* Opal2 SED: Fix misleading error messages during the self-encrypting drives format.
53+
Cryptsetup misinterpreted some error codes when the kernel interface was not available
54+
or the system call failed.
55+
56+
* Opal2 SED: Ensure the system tries to rescan the device after the PSID reset.
57+
Udev should now receive change events, allowing rescan of partition table after PSID reset.
58+
59+
* Fix typos in volume-key-file help and integritysetup man page.
60+
61+
* Fix detection of supported compiler attributes on PPC64 architecture.
62+
63+
* Fix const compilation warnings with new gcc and glibc headers.

0 commit comments

Comments
 (0)