• 公告ID (KylinSec-SA-2023-1099)

摘要:

The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding != 0 comparisons tothe result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.

安全等级: Low

公告ID: KylinSec-SA-2023-1099

发布日期: 2023年2月27日

关联CVE: CVE-2022-45142  

  • 详细介绍

1. 漏洞描述

   

The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding != 0 comparisons tothe result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-45142 KY3.4-4A samba Unaffected
CVE-2022-45142 KY3.4-5A samba Unaffected
CVE-2022-45142 KY3.5.1 samba Unaffected
CVE-2022-45142 KY3.5.2 samba Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2023-1098 下一篇:KylinSec-SA-2023-1100