CVE-2022-45142

The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
redhatCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 19%
VendorProductVersion
heimdal_projectheimdal
7.7.1
heimdal_projectheimdal
7.8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
heimdal
bullseye (security)
7.7.0+dfsg-2+deb11u3
fixed
bullseye
7.7.0+dfsg-2+deb11u3
fixed
bookworm
7.8.git20221117.28daf24+dfsg-2
fixed
sid
7.8.git20221117.28daf24+dfsg-8
fixed
trixie
7.8.git20221117.28daf24+dfsg-8
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
heimdal
noble
needed
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
focal
Fixed 7.7.0+dfsg-1ubuntu1.4
released
bionic
Fixed 7.5.0+dfsg-1ubuntu0.4
released
xenial
Fixed 1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm4
released
trusty
Fixed 1.6~git20131207+dfsg-1ubuntu1.2+esm4
released