CVE-2022-37454
ADVISORY - githubSummary
Impact
The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more.
Patches
Yes, see commit fdc6fef0.
Workarounds
The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether.
References
See issue #105 for more details.
Common Weakness Enumeration (CWE)
Integer Overflow or Wraparound
Integer Overflow or Wraparound
Integer Overflow to Buffer Overflow
Docker
BSA-2022-37454
-
Docker
CVE-2022-37454
-
NIST
3.9
CVSS SCORE
9.8criticalGitHub
3.9
CVSS SCORE
9.8criticalAlpine
-
Debian
-
CVSS SCORE
N/AlowUbuntu
3.9
CVSS SCORE
9.8mediumAlma
-
CVSS SCORE
N/AmediumAlma
-
CVSS SCORE
N/AmediumAlma
-
CVSS SCORE
N/AmediumAlma
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AhighAmazon
-
CVSS SCORE
N/AhighAmazon
-
CVSS SCORE
N/AhighAmazon
-
CVSS SCORE
N/AhighAmazon
-
CVSS SCORE
N/AhighBitnami
BIT-2022-37454
-
CVSS SCORE
N/AcriticalBitnami
BIT-php-2022-37454
3.9
CVSS SCORE
9.8criticalBitnami
BIT-php-min-2022-37454
3.9
CVSS SCORE
9.8criticalBitnami
BIT-python-2022-37454
3.9
CVSS SCORE
9.8criticalBitnami
BIT-python-min-2022-37454
3.9
CVSS SCORE
9.8criticalRed Hat
2.2
CVSS SCORE
8.1highRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumChainguard
CGA-h22x-vf2g-j99v
-
Chainguard
CGA-r7pg-q2hj-vp3j
-
intheWild
-
-