diff options
author | Tomas Mraz <tomas@openssl.org> | 2023-04-21 10:14:13 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-04-26 15:37:10 +0200 |
commit | e6990079c2413625d2039ebed49ea17a5b8cf935 (patch) | |
tree | bc65babc007cec739ea41d4901af891903a63d65 /CHANGES.md | |
parent | doc: document that the "info" KDF param concatenates (diff) | |
download | openssl-e6990079c2413625d2039ebed49ea17a5b8cf935.tar.xz openssl-e6990079c2413625d2039ebed49ea17a5b8cf935.zip |
Correct the CHANGES entry for CVE-2023-1255
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
(Merged from https://github.com/openssl/openssl/pull/20798)
Diffstat (limited to 'CHANGES.md')
-rw-r--r-- | CHANGES.md | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/CHANGES.md b/CHANGES.md index 9d4ace1405..60ef9febd7 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -271,9 +271,9 @@ OpenSSL 3.1 ### Changes between 3.1.0 and 3.1.1 [xx XXX xxxx] * Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which - happens if the buffer size is 4 mod 5. This can trigger a crash of an - application using AES-XTS decryption if the memory just after the buffer - being decrypted is not mapped. + happens if the buffer size is 4 mod 5 in 16 byte AES blocks. This can + trigger a crash of an application using AES-XTS decryption if the memory + just after the buffer being decrypted is not mapped. Thanks to Anton Romanov (Amazon) for discovering the issue. ([CVE-2023-1255]) |