Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 02 Jan 2014 03:13:38 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Some bleeding-jumbo formats with SEGV and ABRT

On 2014-01-01 22:14, Frank Dittrich wrote:
> Here's another hash which causes a crash in openssl-enc.
> It is much shorter than the one I included in my previous mail:
>
> $openssl$0$0$8$305cedc2a0521011$bf11609a01e78ec3f50f0cc483e636f9$1$1$
>
>
> Further testing also revealed another bug:
> The attached file fail_clipperz causes a failing self test, reproducible
> with linux-x86-native and linux-x86-64-native:
>
> (bleeding-jumbo)run $ ./john fail_clipperz
> Loaded 2 password hashes with 2 different salts (Clipperz, SRP [SHA256
> 32/32 oSSL-exp])
> Self test failed (get_hash[0](0))

Please add GitHub issues for things like this (one per format). You can 
report them here too of course.

magnum


Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ