/
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-r7pg-q2hj-vp3j

Published

Last updated

https://images.chainguard.dev/security/CGA-r7pg-q2hj-vp3j
Package

pypy-3.11

RepositoryWolfi
Latest Update
Not affected
Aliases
  • CVE-2022-37454
  • GHSA-6w4m-2xhg-2658

Severity

Unknown

Summary

Buffer overflow in sponge queue functions

Description

Impact

The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more.

Patches

Yes, see commit fdc6fef0.

Workarounds

The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether.

References

See issue #105 for more details.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Products

Chainguard ContainersChainguard LibrariesChainguard VMs