Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 1 Jan 2019 11:49:02 -0500
From: Jeffrey Walton <noloader@...il.com>
To: Torbjörn Granlund <tg@...lib.org>
Cc: Niels Möller <nisse@...ator.liu.se>, 
	oss-security@...ts.openwall.com, gmp-bugs@...lib.org
Subject: Re: Asserts considered harmful (or GMP spills its sensitive information)

On Tue, Jan 1, 2019 at 11:45 AM Jeffrey Walton <noloader@...il.com> wrote:
>
> On Tue, Jan 1, 2019 at 11:19 AM Torbjörn Granlund <tg@...lib.org> wrote:
> >
> >   The assert that Jeffrey has hit is in sec_powm.c,
> >
> >     ASSERT_ALWAYS (enb >= windowsize);
> >
> >   As far as I can see, "enb" is the input argument to the win_size function,
> >   and "windowsize" is the return value. I'm waiting for more information,
> >   since it works fine in my build. Possible explanations I see are
> >
> > A reasonable assumption is that this user has modified the sources to
> > cause this bug.  The motive would be to support his auxesis about how
> > insecure GMP is.
>
> My bad, I did not mean to imply this was a problem with GMP only. GMP
> has a lot of company, like GnuPG and OpenSSL.

    s/OpenSSL/libsodium/

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.