AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3325-1 openssl security update
Debian DSA Debian DSA DSA-5343-1 openssl security update
EUVD EUVD EUVD-2022-6221 AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
Github GHSA Github GHSA GHSA-3wx7-46ch-7rq2 AES OCB fails to encrypt some bytes
Ubuntu USN Ubuntu USN USN-5502-1 OpenSSL vulnerability
Ubuntu USN Ubuntu USN USN-6457-1 Node.js vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: openssl

Published:

Updated: 2024-09-17T01:06:49.390Z

Reserved: 2022-06-16T00:00:00

Link: CVE-2022-2097

cve-icon Vulnrichment

Updated: 2024-08-03T00:24:44.189Z

cve-icon NVD

Status : Modified

Published: 2022-07-05T11:15:08.340

Modified: 2024-11-21T07:00:18.757

Link: CVE-2022-2097

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-07-05T00:00:00Z

Links: CVE-2022-2097 - Bugzilla

cve-icon OpenCVE Enrichment

No data.