Mageia 2022-0255: openssl security update
Summary
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised
implementation will not encrypt the entirety of the data under some
circumstances. This could reveal sixteen bytes of data that was
preexisting in the memory that wasn't written. In the special case of "in
place" encryption, sixteen bytes of the plaintext would be revealed. Since
OpenSSL does not support OCB based cipher suites for TLS and DTLS, they
are both unaffected. (CVE-2022-2097)
References
- https://bugs.mageia.org/show_bug.cgi?id=30619
- https://openssl-library.org/news/secadv/20220705.txt
- https://ubuntu.com/security/notices/USN-5502-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097
Resolution
MGASA-2022-0255 - Updated openssl packages fix security vulnerability
SRPMS
- 8/core/openssl-1.1.1q-1.mga8