Right, so risky in places where collision and chosen-prefix attacks can be mounted... just trying to ascertain whether the static analysis which highlighted this bug identified an exploitable security vulnerability or just another hardening opportunity. Sounds like the latter.
Right, so risky in places where collision and chosen-prefix attacks can be mounted... just trying to ascertain whether the static analysis which highlighted this bug identified an exploitable security vulnerability or just another hardening opportunity. Sounds like the latter.
It's worth noting however that similar issues were just pointed out yesterday in rsync (it uses MD5 for identifying alterations to blocks rather than stream integrity, but perhaps a tangentially similar problem space?). http:// openwall. com/lists/ oss-security/ 2014/07/ 28/1http: //openwall. com/lists/ oss-security/ 2014/07/ 28/1