Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 877849 (CVE-2022-37454)

Summary: [Tracker] Buffer overflow in XKCP SHA-3 reference implementation
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal    
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://mouha.be/sha-3-buffer-overflow/
Whiteboard:
Package list:
Runtime testing required: ---
Bug Depends on: 877851, 877853    
Bug Blocks:    

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-21 14:49:16 UTC
CVE-2022-37454:

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.

Github advisory: https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658

URL says python and PHP are affected, haven't found any bug
reports/patches there yet, or what else might be affected.