Описание
Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guid...
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | 3.x openssl only |
esm-apps/bionic | not-affected | 3.x openssl only |
esm-apps/xenial | not-affected | 3.x openssl only |
esm-infra/focal | not-affected | 3.x openssl only |
focal | not-affected | 3.x openssl only |
jammy | not-affected | 3.x openssl only |
lunar | not-affected | 3.x openssl only |
mantic | not-affected | 3.x openssl only |
noble | not-affected | 3.x openssl only |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | uses system openssl1.0 |
devel | not-affected | uses system openssl |
esm-apps/bionic | not-affected | uses system openssl1.0 |
esm-apps/focal | not-affected | uses system openssl |
esm-apps/jammy | needed | |
esm-apps/noble | not-affected | uses system openssl |
esm-apps/xenial | not-affected | uses system openssl |
esm-infra-legacy/trusty | not-affected | uses system openssl |
focal | not-affected | uses system openssl |
jammy | needed |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | released | 3.0.10-1ubuntu2.1 |
esm-infra-legacy/trusty | not-affected | 3.x only |
esm-infra/bionic | not-affected | 3.x only |
esm-infra/focal | not-affected | 3.x only |
esm-infra/xenial | not-affected | 3.x only |
fips-preview/jammy | released | 3.0.2-0ubuntu1.12+Fips1 |
fips-updates/bionic | not-affected | 3.x only |
fips-updates/focal | not-affected | 3.x only |
fips-updates/jammy | released | 3.0.2-0ubuntu1.12+Fips1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | DNE | |
esm-infra/bionic | not-affected | 3.x only |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
lunar | DNE | |
mantic | DNE | |
noble | DNE | |
oracular | DNE |
Показывать по
7.5 High
CVSS3
Связанные уязвимости
Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 ...
Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1
Issue summary: A bug has been identified in the processing of key and ...
7.5 High
CVSS3