[Bug 2060564] Re: miscomputation of ECP::ScalarMultiply() using 5.6.4-9

2024-04-12 Thread Mark Esler
There is a strong chance that https://bugs.launchpad.net/ubuntu/+source/libcrypto++/+bug/1893934 is related to the incomplete CVE-2019-14318 patch regression. I plan to propose an SRU to effectively downgrade this regressed package to 5.6.4-8. Please see https://github.com/weidai11/cryptopp/issue

[Bug 2060564] Re: miscomputation of ECP::ScalarMultiply() using 5.6.4-9

2024-04-08 Thread Mark Esler
Debian `libcrypto++` 5.6.4-9 introduced a security patch for CVE-2019-14318. According to a post in 2019 , https://github.com/weidai11/cryptopp/issues/869, the CVE-2019-14318 patch for 5.6.4 was incomplete. A comment in a later 2020 issue mentions that the 2019 8.3 patch was broken: https://github

[Bug 2060564] Re: miscomputation of ECP::ScalarMultiply() using 5.6.4-9

2024-04-08 Thread Mark Esler
With fresh amd64 VMs using the latest Ubuntu point releases, I was able to reproduce your report on Ubuntu Focal 20.04.06 (`libcrypto++` version 5.6.4-9build1). Both Bionic 18.04.06 (`libcrypto++` version 5.6.4-8) and Jammy 22.04.04 (`libcrypto++` version 8.6.0-2ubuntu1) had the expected result. A