On Tue, Jun 03, 2025 at 12:17:26AM +0000, Shawn Webb wrote:
> On Mon, Jun 02, 2025 at 11:33:01PM +0000, Robert Clausecker wrote:
> > The branch main has been updated by fuz:
> > 
> > URL: 
> > https://cgit.FreeBSD.org/src/commit/?id=e698e4a537736f6a7dd9a386e00997d7fb08e83f
> > 
> > commit e698e4a537736f6a7dd9a386e00997d7fb08e83f
> > Author:     Robert Clausecker <f...@freebsd.org>
> > AuthorDate: 2025-06-02 22:54:32 +0000
> > Commit:     Robert Clausecker <f...@freebsd.org>
> > CommitDate: 2025-06-02 23:27:00 +0000
> > 
> >     lib/libmd: disable SHA1 AVX2 kernel
> >     
> >     Seems like there is a bug lurking somewhere in the code.  This was not
> >     caught during my testing.  Disable the affected kernel for now while I
> >     figure out what is wrong with it.
> >     
> >     To reproduce, run
> >     
> >         jot -s '' -b 'a' -n 1000000 | sha1
> >     
> >     This should yield 34aa973cd4c4daa4f61eeb2bdbad27316534016f, but gives
> >     fe161a71d7941e3d63a9cacadc4f20716a721944 with the broken code.  Only the
> >     amd64/avx2 kernel is affected, the others seem to operate correctly.
> 
> Out of curiosity, how would one best determine whether they're
> affected? Would it be a part of the CPU features shown in
> /var/run/dmesg.boot?

Nevermind, running your reproducer above is sufficient. And, it
appears that one of my Intel laptops is affected. I do see the
following line in /var/run/dmesg.boot:

Structured Extended 
Features=0x1407a9<FSGSBASE,BMI1,AVX2,SMEP,BMI2,ERMS,INVPCID,RDSEED,SMAP>

Sorry for the noise.

-- 
Shawn Webb
Cofounder / Security Engineer
HardenedBSD

Signal Username:  shawn_webb.74
Tor-ified Signal: +1 303-901-1600 / shawn_webb_opsec.50
https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc

Attachment: signature.asc
Description: PGP signature

Reply via email to