AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3325-1 | openssl security update |
Debian DSA |
DSA-5343-1 | openssl security update |
EUVD |
EUVD-2022-6221 | AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p). |
Github GHSA |
GHSA-3wx7-46ch-7rq2 | AES OCB fails to encrypt some bytes |
Ubuntu USN |
USN-5502-1 | OpenSSL vulnerability |
Ubuntu USN |
USN-6457-1 | Node.js vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: openssl
Published:
Updated: 2024-09-17T01:06:49.390Z
Reserved: 2022-06-16T00:00:00
Link: CVE-2022-2097
Updated: 2024-08-03T00:24:44.189Z
Status : Modified
Published: 2022-07-05T11:15:08.340
Modified: 2024-11-21T07:00:18.757
Link: CVE-2022-2097
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN