Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2022-37454
Description:The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
Test IDs: 1.3.6.1.4.1.25623.1.0.148943   1.3.6.1.4.1.25623.1.1.12.2023.6524.1   1.3.6.1.4.1.25623.1.0.893175   1.3.6.1.4.1.25623.1.0.148942   1.3.6.1.4.1.25623.1.0.705267   1.3.6.1.4.1.25623.1.1.12.2023.5930.1   1.3.6.1.4.1.25623.1.0.822884   1.3.6.1.4.1.25623.1.0.893174   1.3.6.1.4.1.25623.1.0.148944   1.3.6.1.4.1.25623.1.0.822881   1.3.6.1.4.1.25623.1.0.822889   1.3.6.1.4.1.25623.1.0.822865   1.3.6.1.4.1.25623.1.0.822858   1.3.6.1.4.1.25623.1.0.822883   1.3.6.1.4.1.25623.1.1.2.2023.1455   1.3.6.1.4.1.25623.1.1.12.2023.6525.1   1.3.6.1.4.1.25623.1.0.822880   1.3.6.1.4.1.25623.1.0.822850   1.3.6.1.4.1.25623.1.0.827342   1.3.6.1.4.1.25623.1.1.2.2023.1480   1.3.6.1.4.1.25623.1.1.12.2023.5931.1   1.3.6.1.4.1.25623.1.0.705269   1.3.6.1.4.1.25623.1.1.12.2023.5767.3   1.3.6.1.4.1.25623.1.0.822895  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2022-37454
https://security.gentoo.org/glsa/202305-02
https://csrc.nist.gov/projects/hash-functions/sha-3-project
https://csrc.nist.gov/projects/hash-functions/sha-3-project
https://eprint.iacr.org/2023/331
https://eprint.iacr.org/2023/331
https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658
https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658
https://lists.debian.org/debian-lts-announce/2022/10/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/
https://mouha.be/sha-3-buffer-overflow/
https://mouha.be/sha-3-buffer-overflow/
https://news.ycombinator.com/item?id=33281106
https://news.ycombinator.com/item?id=33281106
https://news.ycombinator.com/item?id=35050307
https://news.ycombinator.com/item?id=35050307
https://www.debian.org/security/2022/dsa-5267
https://www.debian.org/security/2022/dsa-5267
https://www.debian.org/security/2022/dsa-5269
https://www.debian.org/security/2022/dsa-5269




© 1998-2025 E-Soft Inc. All rights reserved.