AES OCB fails to encrypt some bytes
Description
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
AES OCB mode in OpenSSL on 32-bit x86 with AES-NI assembly fails to encrypt all data, potentially exposing 16 bytes of memory; fixed in OpenSSL 3.0.5 and 1.1.1q.
Vulnerability Description The AES OCB (Offset Codebook Mode) implementation in OpenSSL for 32-bit x86 platforms using the AES-NI assembly-optimized code fails to encrypt the entirety of the data under certain circumstances. This bug can result in sixteen bytes of data that was preexisting in memory being left unencrypted, potentially revealing sensitive information [2][4].
Attack Vector Exploiting this vulnerability requires the use of AES OCB mode on a 32-bit x86 system with AES-NI instructions and the assembly-optimized code path. Importantly, OpenSSL does not support OCB-based cipher suites for TLS or DTLS, so these protocols are not affected. The attack may be relevant in scenarios where applications directly use AES OCB encryption via OpenSSL's EVP interface [2].
Impact If successfully triggered, the vulnerability could disclose up to sixteen bytes of unencrypted data. In the special case of in-place encryption, those sixteen bytes correspond to plaintext, while otherwise they could be stale memory contents. The severity is rated MODERATE by OpenSSL [2].
Mitigation OpenSSL has released fixes in versions 3.0.5 (for 3.0.x) and 1.1.1q (for 1.1.x). Users running affected versions should update immediately. No workarounds are known. The Rust crate openssl-src has also been patched to include the fixed versions [4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openssl-srccrates.io | < 111.22.0 | 111.22.0 |
openssl-srccrates.io | >= 300.0.0, < 300.0.9 | 300.0.9 |
Affected products
51- osv-coords50 versionspkg:apk/chainguard/ruby-3.1pkg:apk/chainguard/ruby-3.1-basepkg:apk/chainguard/ruby-3.1-base-devpkg:apk/chainguard/ruby-3.1-devpkg:apk/chainguard/ruby-3.1-docpkg:apk/wolfi/ruby-3.1pkg:apk/wolfi/ruby-3.1-basepkg:apk/wolfi/ruby-3.1-base-devpkg:apk/wolfi/ruby-3.1-devpkg:apk/wolfi/ruby-3.1-docpkg:cargo/openssl-srcpkg:rpm/almalinux/opensslpkg:rpm/almalinux/openssl-develpkg:rpm/almalinux/openssl-libspkg:rpm/almalinux/openssl-perlpkg:rpm/opensuse/openssl-1_1&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/openssl-1_1&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/openssl-3&distro=openSUSE%20Leap%2015.4pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012pkg:rpm/suse/openssl-1_1&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/openssl-1_1&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/openssl-1_1&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/openssl-1_1&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/openssl-1_1&distro=SUSE%20Manager%20Server%204.1pkg:rpm/suse/openssl-1_1&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/openssl-1_1&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/openssl-3&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4
< 0+ 49 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 111.22.0
- (no CPE)range: < 1:1.1.1k-7.el8_6
- (no CPE)range: < 1:1.1.1k-7.el8_6
- (no CPE)range: < 1:1.1.1k-7.el8_6
- (no CPE)range: < 1:1.1.1k-7.el8_6
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1l-150400.7.7.1
- (no CPE)range: < 3.0.1-150400.4.7.1
- (no CPE)range: < 12.22.12-1.51.1
- (no CPE)range: < 1.1.0i-150100.14.36.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.0i-150100.14.36.1
- (no CPE)range: < 1.1.0i-150100.14.36.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.0i-150000.4.74.1
- (no CPE)range: < 1.1.0i-150000.4.74.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1l-150400.7.7.1
- (no CPE)range: < 1.1.1d-2.69.1
- (no CPE)range: < 1.1.1d-2.69.1
- (no CPE)range: < 1.1.0i-150100.14.36.1
- (no CPE)range: < 1.1.0i-150100.14.36.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.0i-150000.4.74.1
- (no CPE)range: < 1.1.1d-2.69.1
- (no CPE)range: < 1.1.1d-2.69.1
- (no CPE)range: < 1.1.0i-150000.4.74.1
- (no CPE)range: < 1.1.0i-150100.14.36.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1d-2.69.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1d-150200.11.51.1
- (no CPE)range: < 1.1.1d-2.69.1
- (no CPE)range: < 1.1.1d-2.69.1
- (no CPE)range: < 3.0.1-150400.4.7.1
- Range: Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
27- github.com/advisories/GHSA-3wx7-46ch-7rq2ghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/mitrevendor-advisory
- nvd.nist.gov/vuln/detail/CVE-2022-2097ghsaADVISORY
- security.gentoo.org/glsa/202210-02ghsavendor-advisoryWEB
- www.debian.org/security/2023/dsa-5343ghsavendor-advisoryWEB
- cert-portal.siemens.com/productcert/pdf/ssa-332410.pdfghsaWEB
- git.openssl.org/gitweb/ghsaWEB
- git.openssl.org/gitweb/ghsaWEB
- git.openssl.org/gitweb/ghsaWEB
- git.openssl.org/gitweb/ghsaWEB
- lists.debian.org/debian-lts-announce/2023/02/msg00019.htmlghsamailing-listWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAKghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XAghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAKghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XAghsaWEB
- rustsec.org/advisories/RUSTSEC-2022-0032.htmlghsaWEB
- security.netapp.com/advisory/ntap-20220715-0011ghsaWEB
- security.netapp.com/advisory/ntap-20230420-0008ghsaWEB
- security.netapp.com/advisory/ntap-20240621-0006ghsaWEB
- www.openssl.org/news/secadv/20220705.txtghsaWEB
- security.netapp.com/advisory/ntap-20220715-0011/mitre
- security.netapp.com/advisory/ntap-20230420-0008/mitre
- security.netapp.com/advisory/ntap-20240621-0006/mitre
News mentions
0No linked articles in our index yet.