Описание
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
Отчет
Samba in RHEL is not compiled to use the Heimdal Kerberos library. Versions of Samba shipped in Red Hat Enterprise Linux are compiled to use the system MIT Kerberos using the "--with-system-mitkrb5" argument, and these installations are not impacted, as the vulnerable code is not compiled into Samba.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | samba | Not affected | ||
Red Hat Enterprise Linux 7 | samba | Not affected | ||
Red Hat Enterprise Linux 8 | samba | Not affected | ||
Red Hat Enterprise Linux 9 | samba | Not affected | ||
Red Hat Storage 3 | samba | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
Связанные уязвимости
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
The fix for CVE-2022-3437 included changing memcmp to be constant time ...
EPSS