CVE-2022-2097

Name
CVE-2022-2097
Description
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://www.openssl.org/news/secadv/20220705.txt
CONFIRM https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93
CONFIRM https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/

Match rules

CPE URI Source package Min version Max version

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openssl 3.16-main 1.1.1q-r0 Timo Teras <timo.teras@iki.fi> fixed
openssl3 3.16-main 3.0.5-r0 Ariadne Conill <ariadne@dereferenced.org> fixed
openssl 3.15-main 1.1.1q-r0 Timo Teras <timo.teras@iki.fi> fixed
openssl3 3.15-main 3.0.5-r0 Timo Teras <timo.teras@iki.fi> fixed
openssl 3.14-main 1.1.1q-r0 Timo Teras <timo.teras@iki.fi> fixed
openssl 3.13-main 1.1.1q-r0 Timo Teras <timo.teras@iki.fi> fixed