Linux ubuntu 6.8.0-90-generic #91-Ubuntu SMP PREEMPT_DYNAMIC Tue Nov 18 14:14:30 UTC 2025 x86_64
nginx/1.24.0
: 67.217.245.49 | : 216.73.216.153
Cant Read [ /etc/named.conf ]
8.3.6
www-data
Bypass.pw
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
cryptsetup /
[ HOME SHELL ]
Name
Size
Permission
Action
examples
[ DIR ]
drwxr-xr-x
AUTHORS
137
B
-rw-r--r--
FAQ.md.gz
49.58
KB
-rw-r--r--
Keyring.txt
3.81
KB
-rw-r--r--
LUKS2-locking.txt
3.87
KB
-rw-r--r--
NEWS.Debian.gz
660
B
-rw-r--r--
README.Debian.gz
5.61
KB
-rw-r--r--
README.debug
2.67
KB
-rw-r--r--
README.gnupg
1.8
KB
-rw-r--r--
README.gnupg-sc
2.3
KB
-rw-r--r--
README.keyctl
3.5
KB
-rw-r--r--
README.md.gz
2.45
KB
-rw-r--r--
README.opensc.gz
2.17
KB
-rw-r--r--
changelog.Debian.gz
16.67
KB
-rw-r--r--
copyright
11.11
KB
-rw-r--r--
v1.0.7-ReleaseNotes
2.85
KB
-rw-r--r--
v1.1.0-ReleaseNotes.gz
2.22
KB
-rw-r--r--
v1.1.1-ReleaseNotes
1.75
KB
-rw-r--r--
v1.1.2-ReleaseNotes
1.56
KB
-rw-r--r--
v1.1.3-ReleaseNotes
482
B
-rw-r--r--
v1.2.0-ReleaseNotes.gz
2.08
KB
-rw-r--r--
v1.3.0-ReleaseNotes.gz
2.08
KB
-rw-r--r--
v1.3.1-ReleaseNotes
421
B
-rw-r--r--
v1.4.0-ReleaseNotes.gz
2.2
KB
-rw-r--r--
v1.4.1-ReleaseNotes
889
B
-rw-r--r--
v1.4.2-ReleaseNotes
1.6
KB
-rw-r--r--
v1.4.3-ReleaseNotes
2.31
KB
-rw-r--r--
v1.5.0-ReleaseNotes.gz
3.24
KB
-rw-r--r--
v1.5.1-ReleaseNotes
1.26
KB
-rw-r--r--
v1.6.0-ReleaseNotes.gz
3.73
KB
-rw-r--r--
v1.6.1-ReleaseNotes
1.02
KB
-rw-r--r--
v1.6.2-ReleaseNotes
989
B
-rw-r--r--
v1.6.3-ReleaseNotes
1.82
KB
-rw-r--r--
v1.6.4-ReleaseNotes
1.99
KB
-rw-r--r--
v1.6.5-ReleaseNotes
2.42
KB
-rw-r--r--
v1.6.6-ReleaseNotes
1.07
KB
-rw-r--r--
v1.6.7-ReleaseNotes
3.26
KB
-rw-r--r--
v1.6.8-ReleaseNotes
2.02
KB
-rw-r--r--
v1.7.0-ReleaseNotes
3.03
KB
-rw-r--r--
v1.7.1-ReleaseNotes
1.34
KB
-rw-r--r--
v1.7.2-ReleaseNotes
1.45
KB
-rw-r--r--
v1.7.3-ReleaseNotes
811
B
-rw-r--r--
v1.7.4-ReleaseNotes
661
B
-rw-r--r--
v1.7.5-ReleaseNotes
833
B
-rw-r--r--
v2.0.0-ReleaseNotes.gz
9.5
KB
-rw-r--r--
v2.0.1-ReleaseNotes.gz
2.17
KB
-rw-r--r--
v2.0.2-ReleaseNotes.gz
1.95
KB
-rw-r--r--
v2.0.3-ReleaseNotes.gz
2.39
KB
-rw-r--r--
v2.0.4-ReleaseNotes.gz
2.27
KB
-rw-r--r--
v2.0.5-ReleaseNotes.gz
2.02
KB
-rw-r--r--
v2.0.6-ReleaseNotes.gz
1.91
KB
-rw-r--r--
v2.1.0-ReleaseNotes.gz
3.41
KB
-rw-r--r--
v2.2.0-ReleaseNotes.gz
4.47
KB
-rw-r--r--
v2.2.1-ReleaseNotes
1.38
KB
-rw-r--r--
v2.2.2-ReleaseNotes
2.1
KB
-rw-r--r--
v2.3.0-ReleaseNotes.gz
3.18
KB
-rw-r--r--
v2.3.1-ReleaseNotes
1.73
KB
-rw-r--r--
v2.3.2-ReleaseNotes
1.47
KB
-rw-r--r--
v2.3.3-ReleaseNotes
1.36
KB
-rw-r--r--
v2.3.4-ReleaseNotes.gz
1.95
KB
-rw-r--r--
v2.3.5-ReleaseNotes.gz
3.06
KB
-rw-r--r--
v2.3.6-ReleaseNotes
2.26
KB
-rw-r--r--
v2.4.0-ReleaseNotes.gz
4.65
KB
-rw-r--r--
v2.4.1-ReleaseNotes
1.9
KB
-rw-r--r--
v2.4.2-ReleaseNotes
1.34
KB
-rw-r--r--
v2.4.3-ReleaseNotes.gz
1.95
KB
-rw-r--r--
v2.5.0-ReleaseNotes.gz
4.35
KB
-rw-r--r--
v2.6.0-ReleaseNotes.gz
3.62
KB
-rw-r--r--
v2.6.1-ReleaseNotes
2.06
KB
-rw-r--r--
v2.7.0-ReleaseNotes.gz
6.5
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : v2.6.1-ReleaseNotes
Cryptsetup 2.6.1 Release Notes ============================== Stable bug-fix release with minor extensions. All users of cryptsetup 2.6.0 should upgrade to this version. Changes since version 2.6.0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~ * bitlk: Fixes for BitLocker-compatible on-disk metadata parser (found by new cryptsetup OSS-Fuzz fuzzers). - Fix a possible memory leak if the metadata contains more than one description field. - Harden parsing of metadata entries for key and description entries. - Fix broken metadata parsing that can cause a crash or out of memory. * Fix possible iteration overflow in OpenSSL2 PBKDF2 crypto backend. OpenSSL2 uses a signed integer for PBKDF2 iteration count. As cryptsetup uses an unsigned value, this can lead to overflow and a decrease in the actual iteration count. This situation can happen only if the user specifies --pbkdf-force-iterations option. OpenSSL3 (and other supported crypto backends) are not affected. * Fix compilation for new ISO C standards (gcc with -std=c11 and higher). * fvault2: Fix compilation with very old uuid.h. * verity: Fix possible hash offset setting overflow. * bitlk: Fix use of startup BEK key on big-endian platforms. * Fix compilation with latest musl library. Recent musl no longer implements lseek64() in some configurations. Use lseek() as 64-bit offset is mandatory for cryptsetup. * Do not initiate encryption (reencryption command) when the header and data devices are the same. If data device reduction is not requsted, this leads to data corruption since LUKS metadata was written over the data device. * Fix possible memory leak if crypt_load() fails. * Always use passphrases with a minimal 8 chars length for benchmarking. Some enterprise distributions decided to set an unconditional check for PBKDF2 password length when running in FIPS mode. This questionable change led to unexpected failures during LUKS format and keyslot operations, where short passwords were used for benchmarking PBKDF2 speed. PBKDF2 benchmark calculations should not be affected by this change.
Close