OpenSSL: bug in bit sliced AES in GCM mode

Bug #1208374 reported by Ard Biesheuvel
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Linaro Ubuntu
Fix Released
Medium
Fathi Boudra

Bug Description

There is a bug in the wrapper code for AES in XTS and GCM chaining modes that results in corrupted data.

The core issue is that the code does not correctly handle the case where BSAES_CAPABLE is #defined but VPAES_CAPABLE is not (this combination only occurs on ARM with the recently enabled bit sliced AES optimizations)

Fix is here: http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a59f4362

Fathi Boudra (fboudra)
Changed in linaro-ubuntu:
status: New → In Progress
importance: Undecided → Medium
assignee: nobody → Fathi Boudra (fboudra)
milestone: none → 13.08
Fathi Boudra (fboudra)
Changed in linaro-ubuntu:
status: In Progress → Fix Committed
Fathi Boudra (fboudra)
Changed in linaro-ubuntu:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.