Correct the CHANGES entry for CVE-2023-1255

Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
(Merged from https://github.com/openssl/openssl/pull/20798)
This commit is contained in:
Tomas Mraz 2023-04-21 10:14:13 +02:00
parent fc374a087e
commit e6990079c2

View File

@ -271,9 +271,9 @@ OpenSSL 3.1
### Changes between 3.1.0 and 3.1.1 [xx XXX xxxx] ### Changes between 3.1.0 and 3.1.1 [xx XXX xxxx]
* Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which * Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which
happens if the buffer size is 4 mod 5. This can trigger a crash of an happens if the buffer size is 4 mod 5 in 16 byte AES blocks. This can
application using AES-XTS decryption if the memory just after the buffer trigger a crash of an application using AES-XTS decryption if the memory
being decrypted is not mapped. just after the buffer being decrypted is not mapped.
Thanks to Anton Romanov (Amazon) for discovering the issue. Thanks to Anton Romanov (Amazon) for discovering the issue.
([CVE-2023-1255]) ([CVE-2023-1255])