![]() This is fairly unlikely making this issueĪ Low severity one. If an attacker can control the size and location of the ciphertext bufferīeing decrypted by an application using AES-XTS on 64 bit ARM, theĪpplication is affected. If the memory after the ciphertextīuffer is unmapped, this will trigger a crash which results in a denial of Past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16īyte blocks, e.g. ![]() The AES-XTS cipher decryption implementation for 64 bit ARM platform will read Platform can crash in rare circumstances. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM Platform contains a bug that could cause it to read past the input buffer,
0 Comments
Leave a Reply. |