Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 877849 (CVE-2022-37454) - [Tracker] Buffer overflow in XKCP SHA-3 reference implementation
Summary: [Tracker] Buffer overflow in XKCP SHA-3 reference implementation
Alias: CVE-2022-37454
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Depends on: 877851 CVE-2022-31630
  Show dependency tree
Reported: 2022-10-21 14:49 UTC by John Helmert III
Modified: 2022-10-21 16:06 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-21 14:49:16 UTC

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.

Github advisory:

URL says python and PHP are affected, haven't found any bug
reports/patches there yet, or what else might be affected.