摘要:
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding != 0 comparisons tothe result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
安全等级: Low
公告ID: KylinSec-SA-2023-1099
发布日期: 2023年2月27日
关联CVE: CVE-2022-45142
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding != 0 comparisons tothe result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-45142 | KY3.4-4A | samba | Unaffected |
CVE-2022-45142 | KY3.4-5A | samba | Unaffected |
CVE-2022-45142 | KY3.5.1 | samba | Unaffected |
CVE-2022-45142 | KY3.5.2 | samba | Unaffected |