CVE-2022-2097

Name
CVE-2022-2097
Description
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://www.openssl.org/news/secadv/20220705.txt
CONFIRM https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93
CONFIRM https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/
Third Party Advisory https://security.netapp.com/advisory/ntap-20220715-0011/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/
vendor-advisory https://security.gentoo.org/glsa/202210-02
Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
vendor-advisory https://www.debian.org/security/2023/dsa-5343
mailing-list https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html
CONFIRM https://security.netapp.com/advisory/ntap-20230420-0008/
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431
vendor-advisory https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/
vendor-advisory https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/
vendor-advisory https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/
https://security.netapp.com/advisory/ntap-20240621-0006/

Match rules

CPE URI Source package Min version Max version
openssl == Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4) == Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4)
openssl == Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p) == Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p)

Vulnerable and fixed packages

Source package Branch Version Maintainer Status