From b06bf4f348245963a47c26a91cca9f3f74d8a725 Mon Sep 17 00:00:00 2001 From: "wtc@chromium.org" Date: Wed, 2 Oct 2013 19:42:52 +0000 Subject: Update the NSS bug number for the invalid read when AES-CBC decrypting. R=eroman@chromium.org BUG=300681 TEST=none Review URL: https://codereview.chromium.org/25637004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@226530 0039d316-1c4b-4281-b951-d872f2087c98 --- crypto/encryptor_nss.cc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'crypto/encryptor_nss.cc') diff --git a/crypto/encryptor_nss.cc b/crypto/encryptor_nss.cc index 4aee21f..ca5d523 100644 --- a/crypto/encryptor_nss.cc +++ b/crypto/encryptor_nss.cc @@ -101,7 +101,7 @@ bool Encryptor::Decrypt(const base::StringPiece& ciphertext, if (ciphertext.size() % AES_BLOCK_SIZE != 0) { // Decryption will fail if the input is not a multiple of the block size. // PK11_CipherOp has a bug where it will do an invalid memory access before - // the start of the input, so avoid calling it. (Possibly NSS bug 921687). + // the start of the input, so avoid calling it. (NSS bug 922780). plaintext->clear(); return false; } -- cgit v1.1