Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. openssl-src
  4. ›
  5. CVE-2022-2097

CVE-2022-2097: AES OCB fails to encrypt some bytes

July 6, 2022 (updated June 24, 2024)

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was pre-existing in the memory that wasn’t written. In the special case of “in place” encryption, sixteen bytes of the plaintext would be revealed.

Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.

References

  • cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
  • git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431
  • git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93
  • git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431
  • git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93
  • github.com/advisories/GHSA-3wx7-46ch-7rq2
  • github.com/alexcrichton/openssl-src-rs
  • lists.debian.org/debian-lts-announce/2023/02/msg00019.html
  • lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
  • lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
  • lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
  • nvd.nist.gov/vuln/detail/CVE-2022-2097
  • rustsec.org/advisories/RUSTSEC-2022-0032.html
  • security.gentoo.org/glsa/202210-02
  • security.netapp.com/advisory/ntap-20220715-0011
  • security.netapp.com/advisory/ntap-20230420-0008
  • security.netapp.com/advisory/ntap-20240621-0006
  • www.debian.org/security/2023/dsa-5343
  • www.openssl.org/news/secadv/20220705.txt

Code Behaviors & Features

Detect and mitigate CVE-2022-2097 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 111.22.0, all versions starting from 300.0.0 before 300.0.9

Fixed versions

  • 111.22.0
  • 300.0.9

Solution

Upgrade to versions 111.22.0, 300.0.9 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-311: Missing Encryption of Sensitive Data
  • CWE-326: Inadequate Encryption Strength
  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm

Source file

cargo/openssl-src/CVE-2022-2097.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:49 +0000.