Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/pypy3@7.3.9%2Bdfsg-5?distro=trixie
purl pkg:deb/debian/pypy3@7.3.9%2Bdfsg-5?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-ewbq-2gm8-tyf5 Buffer overflow in sponge queue functions ### Impact The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more. ### Patches Yes, see commit [fdc6fef0](https://github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc38364248975e08e340a). ### Workarounds The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether. ### References See [issue #105](https://github.com/XKCP/XKCP/issues/105) for more details. CVE-2022-37454
GHSA-6w4m-2xhg-2658

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T09:48:26.111895+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T06:33:08.461294+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:50:32.980192+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.1.0