{"id":"JLSEC-2026-230","summary":"AES OCB fails to encrypt some bytes","details":"AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).","modified":"2026-04-27T20:32:29.777596990Z","published":"2026-04-27T18:33:55.942Z","upstream":["CVE-2022-2097","EUVD-2022-6221","GHSA-3wx7-46ch-7rq2"],"database_specific":{"sources":[{"published":"2022-07-05T11:15:08.340Z","imported":"2026-04-27T16:32:34.553Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-2097","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2097","modified":"2024-11-21T07:00:18.757Z","database_specific":{"status":"Modified"},"id":"CVE-2022-2097"},{"published":"2022-07-06T19:57:19Z","imported":"2026-04-27T16:34:08.944Z","url":"https://api.github.com/advisories/GHSA-3wx7-46ch-7rq2","html_url":"https://github.com/advisories/GHSA-3wx7-46ch-7rq2","modified":"2024-06-24T21:24:19Z","id":"GHSA-3wx7-46ch-7rq2"},{"published":"2022-07-05T10:30:13Z","imported":"2026-04-27T16:33:21.118Z","url":"https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2022-6221","html_url":"https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-6221","modified":"2024-09-17T01:06:49Z","id":"EUVD-2022-6221"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93"},{"type":"WEB","url":"https://github.com/advisories/GHSA-3wx7-46ch-7rq2"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2097"},{"type":"WEB","url":"https://rustsec.org/advisories/RUSTSEC-2022-0032.html"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202210-02"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220715-0011"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220715-0011/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20230420-0008"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20230420-0008/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240621-0006/"},{"type":"WEB","url":"https://www.debian.org/security/2023/dsa-5343"},{"type":"WEB","url":"https://www.openssl.org/news/secadv/20220705.txt"}],"affected":[{"package":{"name":"OpenSSL_jll","ecosystem":"Julia","purl":"pkg:julia/OpenSSL_jll?uuid=458c3c95-2e84-50aa-8efc-19380b2a3a95"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.1.17+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-230.json"}},{"package":{"name":"Openresty_jll","ecosystem":"Julia","purl":"pkg:julia/Openresty_jll?uuid=87da34d4-7b1b-5a94-8376-8cb65bf3132c"},"ranges":[{"type":"SEMVER","events":[{"introduced":"1.19.9+0"},{"fixed":"1.27.1+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-230.json"}}],"schema_version":"1.7.5","credits":[{"name":"another-rex","contact":["https://github.com/another-rex"],"type":"ANALYST"}]}