The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
08 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://security.gentoo.org/glsa/202305-02 - | |
References | () https://mouha.be/sha-3-buffer-overflow/ - Exploit, Third Party Advisory | |
References | () https://csrc.nist.gov/projects/hash-functions/sha-3-project - Third Party Advisory, US Government Resource | |
References | () https://lists.debian.org/debian-lts-announce/2022/10/msg00041.html - Mailing List, Third Party Advisory | |
References | () https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658 - Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/ - Mailing List, Third Party Advisory | |
References | () https://eprint.iacr.org/2023/331 - | |
References | () https://www.debian.org/security/2022/dsa-5267 - Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=33281106 - Issue Tracking, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=35050307 - | |
References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/ - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2022/dsa-5269 - Third Party Advisory |
03 May 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-10-21 06:15
Updated : 2025-05-08 15:15
NVD link : CVE-2022-37454
Mitre link : CVE-2022-37454
JSON object : View
Products Affected
debian
- debian_linux
php
- php
pypy
- pypy
pysha3_project
- pysha3
fedoraproject
- fedora
sha3_project
- sha3
python
- python
extended_keccak_code_package_project
- extended_keccak_code_package
CWE
CWE-190
Integer Overflow or Wraparound