Bug 1201332 - VUL-0: CVE-2022-2097: nodejs: AES OCB fails to encrypt some bytes
VUL-0: CVE-2022-2097: nodejs: AES OCB fails to encrypt some bytes
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Normal
: ---
Assigned To: Adam Majer
Security Team bot
https://smash.suse.de/issue/336540/
:
Depends on: CVE-2022-2097
Blocks:
  Show dependency treegraph
 
Reported: 2022-07-08 10:43 UTC by Carlos López
Modified: 2022-07-08 10:54 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2022-07-08 10:43:53 UTC
+++ This bug was initially created as a clone of Bug #1201099 +++

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed.

Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.

Impacts:

All versions of the 18.x, 16.x, and 14.x releases lines.

https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#openssl-aes-ocb-fails-to-encrypt-some-bytes-medium-cve-2022-2097

----------------------------------------
Original OpenSSL advisory
----------------------------------------

AES OCB fails to encrypt some bytes (CVE-2022-2097)

Severity: Moderate

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized
implementation will not encrypt the entirety of the data under some
circumstances. This could reveal sixteen bytes of data that was
preexisting in the memory that wasn't written. In the special case of
"in place" encryption, sixteen bytes of the plaintext would be revealed.

Since OpenSSL does not support OCB based cipher suites for TLS and DTLS,
they are both unaffected.

This issue affects versions 1.1.1 and 3.0. It was addressed in the
releases of 1.1.1q and 3.0.5 on the 5th July 2022.

OpenSSL 1.1.1 users should upgrade to 1.1.1q
OpenSSL 3.0 users should upgrade to 3.0.5

This issue was reported to OpenSSL on the 15th June 2022 by Alex
Chernyakhovsky from Google. The fix was developed by Alex Chernyakhovsky,
David Benjamin and Alejandro Sedeño from Google.
Comment 1 Carlos López 2022-07-08 10:53:05 UTC
Upstream nodejs bundles OpenSSL, but we do not, so this is fixed by updating OpenSSL. Closing.