Bug 2444024 (CVE-2026-3337)

Summary: CVE-2026-3337 aws-lc: AWS-LC: Information disclosure via timing discrepancy in AES-CCM decryption
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dbosanac, jreimann, lball, mdessi, mrizzi, ngough, pcattana, veshanka
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in AWS-LC. This vulnerability, a timing discrepancy, allows an unauthenticated attacker to potentially determine the validity of an authentication tag. This information disclosure could be exploited through timing analysis.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2444174, 2444176, 2444180, 2444171, 2444172, 2444173, 2444175, 2444177, 2444178, 2444179    
Bug Blocks:    

Description OSIDB Bzimport 2026-03-02 22:01:21 UTC
Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis.




The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm.




Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.