Vulnerable to CVE 2022-37454 (SHA-3 buffer overflow)
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
pypy3 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | |||
Bionic |
Invalid
|
Undecided
|
Unassigned | |||
Focal |
In Progress
|
Undecided
|
Steve Beattie | |||
Jammy |
In Progress
|
Undecided
|
Steve Beattie | |||
Kinetic |
Won't Fix
|
Undecided
|
Steve Beattie | |||
Lunar |
Fix Released
|
Undecided
|
Unassigned | |||
pysha3 (Ubuntu) | ||||||
Bionic |
In Progress
|
Undecided
|
Steve Beattie | |||
Focal |
In Progress
|
Undecided
|
Steve Beattie | |||
Jammy |
In Progress
|
Undecided
|
Steve Beattie | |||
Kinetic |
Won't Fix
|
Undecided
|
Steve Beattie | |||
python3.6 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | |||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
Focal |
Invalid
|
Undecided
|
Unassigned | |||
Jammy |
Invalid
|
Undecided
|
Unassigned | |||
Kinetic |
Invalid
|
Undecided
|
Unassigned | |||
Lunar |
Invalid
|
Undecided
|
Unassigned | |||
python3.7 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | |||
Bionic |
New
|
Undecided
|
Unassigned | |||
Focal |
Invalid
|
Undecided
|
Unassigned | |||
Jammy |
Invalid
|
Undecided
|
Unassigned | |||
Kinetic |
Invalid
|
Undecided
|
Unassigned | |||
Lunar |
Invalid
|
Undecided
|
Unassigned | |||
python3.8 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | |||
Bionic |
New
|
Undecided
|
Unassigned | |||
Focal |
New
|
Undecided
|
Unassigned | |||
Jammy |
Invalid
|
Undecided
|
Unassigned | |||
Kinetic |
Invalid
|
Undecided
|
Unassigned | |||
Lunar |
Invalid
|
Undecided
|
Unassigned |
Bug Description
pysha3, pypy3, python3.X are affected by CVE-2022-37454, a security issue in Keccak
https:/
See: https:/
Testing:
python3.X/pypy3:
import hashlib; h = hashlib.sha3_224(); h.update(b'\x01'); \
h.update(
assert h.hexdigest() == '80762e8ce6700f
pysha3:
import sha3; h = sha3.sha3_224(); h.update(b'\x01'); \
h.update(
assert h.hexdigest() == '80762e8ce6700f
For pypy3 and pysha3, I have:
1. Verified the issues exist in the current packages, with the above tests.
2. Built the packages with the attached patches
3. Verified that the packages upgrade
4. Verified the security issues are resolved, with the above tests.
CVE References
Changed in python3.8 (Ubuntu Jammy): | |
status: | New → Invalid |
Changed in python3.8 (Ubuntu Kinetic): | |
status: | New → Invalid |
Changed in python3.8 (Ubuntu Lunar): | |
status: | New → Invalid |
Changed in python3.7 (Ubuntu Jammy): | |
status: | New → Invalid |
Changed in python3.7 (Ubuntu Focal): | |
status: | New → Invalid |
Changed in python3.7 (Ubuntu Kinetic): | |
status: | New → Invalid |
Changed in python3.7 (Ubuntu Lunar): | |
status: | New → Invalid |
Changed in python3.6 (Ubuntu Focal): | |
status: | New → Invalid |
Changed in python3.6 (Ubuntu Jammy): | |
status: | New → Invalid |
Changed in python3.6 (Ubuntu Kinetic): | |
status: | New → Invalid |
Changed in python3.6 (Ubuntu Lunar): | |
status: | New → Invalid |
Changed in pypy3 (Ubuntu Bionic): | |
status: | New → Invalid |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
no longer affects: | pysha3 (Ubuntu) |
Hey Stefano, thanks for preparing the debdiffs for pypy3 and pysha3, my initial examination of them looks good. I'll work on sponsoring them.
For lunar, the fixed version of pypy3 is in lunar-proposed, so I've marked that as fixed committed.