Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 877849 (CVE-2022-37454) - [Tracker] Buffer overflow in XKCP SHA-3 reference implementation
Summary: [Tracker] Buffer overflow in XKCP SHA-3 reference implementation
Status: RESOLVED FIXED
Alias: CVE-2022-37454
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://mouha.be/sha-3-buffer-overflow/
Whiteboard:
Keywords:
Depends on: 877851 CVE-2022-31630
Blocks:
  Show dependency tree
 
Reported: 2022-10-21 14:49 UTC by John Helmert III
Modified: 2023-05-08 03:41 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-21 14:49:16 UTC
CVE-2022-37454:

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.

Github advisory: https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658

URL says python and PHP are affected, haven't found any bug
reports/patches there yet, or what else might be affected.