opnsense-src/crypto/heimdal/lib/gssapi/krb5
Cy Schubert 5abaf08664 heimdal: Fix CVE-2022-4152, signature validation error
When CVE-2022-3437 was fixed by changing memcmp to be a constant
time and the workaround for th e compiler was to add "!=0". However
the logic implmented was inverted resulting in CVE-2022-4152.

Reported by:	Timothy E Zingelman <zingelman _AT_ fnal.gov>
MFC after:	1 day
Security:	CVE-2022-4152
Security:	https://www.cve.org/CVERecord?id=CVE-2022-45142
Security:	https://nvd.nist.gov/vuln/detail/CVE-2022-45142
Security:	https://security-tracker.debian.org/tracker/CVE-2022-45142
Security:	https://bugs.gentoo.org/show_bug.cgi?id=CVE-2022-45142
Security:	https://bugzilla.samba.org/show_bug.cgi?id=15296
Security:	https://www.openwall.com/lists/oss-security/2023/02/08/1
2023-03-09 17:18:49 -08:00
..
8003.c
accept_sec_context.c
acquire_cred.c
add_cred.c
address_to_krb5addr.c
aeap.c
arcfour.c heimdal: Fix CVE-2022-4152, signature validation error 2023-03-09 17:18:49 -08:00
authorize_localname.c
canonicalize_name.c
ccache_name.c
cfx.c
cfx.h
compare_name.c
compat.c
context_time.c
copy_ccache.c
creds.c
decapsulate.c
delete_sec_context.c
display_name.c
display_status.c
duplicate_name.c
encapsulate.c
export_name.c
export_sec_context.c
external.c
get_mic.c
gkrb5_err.et
gsskrb5-private.h
gsskrb5_locl.h
import_name.c
import_sec_context.c
indicate_mechs.c
init.c
init_sec_context.c
inquire_context.c
inquire_cred.c
inquire_cred_by_mech.c
inquire_cred_by_oid.c
inquire_mechs_for_name.c
inquire_names_for_mech.c
inquire_sec_context_by_oid.c
pname_to_uid.c
prf.c
process_context_token.c
release_buffer.c
release_cred.c
release_name.c
sequence.c
set_cred_option.c
set_sec_context_option.c
store_cred.c
test_cfx.c
ticket_flags.c
unwrap.c
verify_mic.c
wrap.c