[ 
https://issues.apache.org/jira/browse/IMPALA-14666?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18051441#comment-18051441
 ] 

ASF subversion and git services commented on IMPALA-14666:
----------------------------------------------------------

Commit a146d91aa7b5ef9e32c59b453e985333721bf799 in impala's branch 
refs/heads/master from Peter Rozsa
[ https://gitbox.apache.org/repos/asf?p=impala.git;h=a146d91aa ]

IMPALA-14666: Fix invalid input handling for aes_decrypt

aes_decrypt with AES_128_GCM and AES_256_GCM modes subtracts the AES
block size from the length of the input that causes negative numbers
if the input text is shorter than the block size. This change adds a
check for GCM mode and reports an error if the input is shorter than
the block size.

Tests:
  - new test cases added to encryption_exprs_errors.test

Change-Id: I8e23c2682b851082479a52d754b74f35fe0734c7
Reviewed-on: http://gerrit.cloudera.org:8080/23839
Reviewed-by: Impala Public Jenkins <[email protected]>
Tested-by: Impala Public Jenkins <[email protected]>


> Invalid input causes crash in aes_decrypt
> -----------------------------------------
>
>                 Key: IMPALA-14666
>                 URL: https://issues.apache.org/jira/browse/IMPALA-14666
>             Project: IMPALA
>          Issue Type: Bug
>          Components: Backend
>            Reporter: Peter Rozsa
>            Assignee: Peter Rozsa
>            Priority: Major
>
> Invalid, smaller than 16-byte-long strings cause a crash for AES_128_GCM mode.
> Reproduction:
> select aes_decrypt("a",'1234567890123456','AES_128_GCM','1234567890123456');



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to