diff options
author | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-10-02 19:42:52 +0000 |
---|---|---|
committer | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-10-02 19:42:52 +0000 |
commit | b06bf4f348245963a47c26a91cca9f3f74d8a725 (patch) | |
tree | d44a07b3fc88b5fa570b16473606153d1acfae8c | |
parent | 951e7c45e47737c4c1bca8f6e97f358bf1b06b7a (diff) | |
download | chromium_src-b06bf4f348245963a47c26a91cca9f3f74d8a725.zip chromium_src-b06bf4f348245963a47c26a91cca9f3f74d8a725.tar.gz chromium_src-b06bf4f348245963a47c26a91cca9f3f74d8a725.tar.bz2 |
Update the NSS bug number for the invalid read when AES-CBC decrypting.
R=eroman@chromium.org
BUG=300681
TEST=none
Review URL: https://codereview.chromium.org/25637004
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@226530 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r-- | crypto/encryptor_nss.cc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/encryptor_nss.cc b/crypto/encryptor_nss.cc index 4aee21f..ca5d523 100644 --- a/crypto/encryptor_nss.cc +++ b/crypto/encryptor_nss.cc @@ -101,7 +101,7 @@ bool Encryptor::Decrypt(const base::StringPiece& ciphertext, if (ciphertext.size() % AES_BLOCK_SIZE != 0) { // Decryption will fail if the input is not a multiple of the block size. // PK11_CipherOp has a bug where it will do an invalid memory access before - // the start of the input, so avoid calling it. (Possibly NSS bug 921687). + // the start of the input, so avoid calling it. (NSS bug 922780). plaintext->clear(); return false; } |