CVE-2022-2097

ADVISORY - github

Summary

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was pre-existing in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed.

Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.

EPSS Score: 0.00407 (0.606)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Use of a Broken or Risky Cryptographic Algorithm

ADVISORY - github

Missing Encryption of Sensitive Data

Inadequate Encryption Strength

Use of a Broken or Risky Cryptographic Algorithm

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Missing Encryption of Sensitive Data

Inadequate Encryption Strength

Use of a Broken or Risky Cryptographic Algorithm

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Missing Cryptographic Step


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in