AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. OpenSSL security advisory: https://www.openssl.org/news/secadv/20220705.txt Upstream fix: https://github.com/openssl/openssl/commit/6ebf6d51596f51d23ccbc17930778d104a57d99c [master] https://github.com/openssl/openssl/commit/919925673d6c9cfed3c1085497f5dfbbed5fc431 [1_1_1-stable] https://github.com/openssl/openssl/commit/a98f339ddd7e8f487d6e0088d4a9a42324885a93 [openssl-3.0]
Created edk2 tracking bugs for this issue: Affects: fedora-all [bug 2105034] Created mingw-openssl tracking bugs for this issue: Affects: fedora-all [bug 2105035] Created openssl tracking bugs for this issue: Affects: fedora-all [bug 2105036] Created openssl1.1 tracking bugs for this issue: Affects: fedora-all [bug 2105037] Created openssl11 tracking bugs for this issue: Affects: epel-7 [bug 2105032] Created openssl3 tracking bugs for this issue: Affects: epel-8 [bug 2105033]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:5818 https://access.redhat.com/errata/RHSA-2022:5818
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:6224 https://access.redhat.com/errata/RHSA-2022:6224
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2097