First published: Tue Jul 05 2022(Updated: )
Alex Chernyakhovsky discovered that OpenSSL incorrectly handled AES OCB mode when using the AES-NI assembly optimized implementation on 32-bit x86 platforms. A remote attacker could possibly use this issue to obtain sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl3 | <3.0.2-0ubuntu1.6 | 3.0.2-0ubuntu1.6 |
=22.04 | ||
All of | ||
ubuntu/libssl1.1 | <1.1.1l-1ubuntu1.6 | 1.1.1l-1ubuntu1.6 |
=21.10 | ||
All of | ||
ubuntu/libssl1.1 | <1.1.1f-1ubuntu2.16 | 1.1.1f-1ubuntu2.16 |
=20.04 | ||
All of | ||
ubuntu/libssl1.1 | <1.1.1-1ubuntu2.1~18.04.20 | 1.1.1-1ubuntu2.1~18.04.20 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSL vulnerability is CVE-2022-2097.
The severity of the OpenSSL vulnerability (CVE-2022-2097) is not mentioned in the provided information.
The OpenSSL vulnerability (CVE-2022-2097) could potentially allow a remote attacker to obtain sensitive information.
The following versions of Ubuntu are affected by the OpenSSL vulnerability (CVE-2022-2097): Ubuntu 22.04, Ubuntu 21.10, Ubuntu 20.04, and Ubuntu 18.04.
To fix the OpenSSL vulnerability (CVE-2022-2097), update the libssl package to the specified remedy version for your Ubuntu version.