AES OCB fails to encrypt some bytes
High severity
GitHub Reviewed
Published
Jul 6, 2022
to the GitHub Advisory Database
•
Updated Jun 24, 2024
Package
Affected versions
>= 300.0.0, < 300.0.9
< 111.22.0
Patched versions
300.0.9
111.22.0
Description
Published by the National Vulnerability Database
Jul 5, 2022
Published to the GitHub Advisory Database
Jul 6, 2022
Reviewed
Jul 6, 2022
Last updated
Jun 24, 2024
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was pre-existing in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed.
Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.
References