diff options
author | Tomas Mraz <tomas@openssl.org> | 2023-04-17 16:51:20 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-04-20 17:48:16 +0200 |
commit | 72dfe46550ee1f1bbfacd49f071419365bc23304 (patch) | |
tree | 0477afabc47052b9d1b264c18f07ca283193d5a9 /providers | |
parent | c8093347f736c7991350d26048b680d0e64974a0 (diff) | |
download | openssl-new-72dfe46550ee1f1bbfacd49f071419365bc23304.tar.gz |
aesv8-armx.pl: Avoid buffer overrread in AES-XTS decryption
Original author: Nevine Ebeid (Amazon)
Fixes: CVE-2023-1255
The buffer overread happens on decrypts of 4 mod 5 sizes.
Unless the memory just after the buffer is unmapped this is harmless.
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
(Merged from https://github.com/openssl/openssl/pull/20759)
Diffstat (limited to 'providers')
0 files changed, 0 insertions, 0 deletions