OpenSSL: bug in bit sliced AES in GCM mode
Bug #1208374 reported by
Ard Biesheuvel
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Linaro Ubuntu |
Fix Released
|
Medium
|
Fathi Boudra |
Bug Description
There is a bug in the wrapper code for AES in XTS and GCM chaining modes that results in corrupted data.
The core issue is that the code does not correctly handle the case where BSAES_CAPABLE is #defined but VPAES_CAPABLE is not (this combination only occurs on ARM with the recently enabled bit sliced AES optimizations)
Fix is here: http://
Changed in linaro-ubuntu: | |
status: | New → In Progress |
importance: | Undecided → Medium |
assignee: | nobody → Fathi Boudra (fboudra) |
milestone: | none → 13.08 |
Changed in linaro-ubuntu: | |
status: | In Progress → Fix Committed |
Changed in linaro-ubuntu: | |
status: | Fix Committed → Fix Released |
To post a comment you must log in.