发布时间: 2023年2月27日
修改时间: 2024年11月30日
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding != 0 comparisons tothe result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Network | Network |
CVSS评分 | 7.5 | 6.5 |
Attack Complexity | Low | Low |
Privileges Required | None | Low |
Scope | Unchanged | Unchanged |
Integrity | High | None |
User Interaction | None | None |
Availability | None | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1099 | The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding != 0 comparisons tothe result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted. | 2023年2月27日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | samba | Unaffected |
KY3.4-5A | samba | Unaffected |
KY3.5.1 | samba | Unaffected |
KY3.5.2 | samba | Unaffected |