CVE Vulnerabilities

CVE-2022-45142

Improper Validation of Integrity Check Value

Published: Mar 06, 2023 | Modified: Mar 06, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding != 0 comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.

Weakness

The product does not validate or incorrectly validates the integrity check values or “checksums” of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.

Affected Software

NameVendorStart VersionEnd Version
HeimdalHeimdal_project7.7.1 (including)7.7.1 (including)
HeimdalHeimdal_project7.8.0 (including)7.8.0 (including)
HeimdalUbuntubionic*
HeimdalUbuntudevel*
HeimdalUbuntuesm-apps/noble*
HeimdalUbuntuesm-infra-legacy/trusty*
HeimdalUbuntuesm-infra/bionic*
HeimdalUbuntuesm-infra/focal*
HeimdalUbuntuesm-infra/xenial*
HeimdalUbuntufocal*
HeimdalUbuntukinetic*
HeimdalUbuntulunar*
HeimdalUbuntumantic*
HeimdalUbuntunoble*
HeimdalUbuntuoracular*
HeimdalUbuntuplucky*
HeimdalUbuntuquesting*
HeimdalUbuntutrusty*
HeimdalUbuntutrusty/esm*
HeimdalUbuntuxenial*

Potential Mitigations

References