CVE-2024-36405

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-36405
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36405.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36405
Related
Published
2024-06-10T13:15:50Z
Modified
2025-01-15T05:14:25.712256Z
Summary
[none]
Details

liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. A control-flow timing lean has been identified in the reference implementation of the Kyber key encapsulation mechanism when it is compiled with Clang 15-18 for -Os, -O1, and other compilation options. A proof-of-concept local attack on the reference implementation leaks the entire ML-KEM 512 secret key in ~10 minutes using end-to-end decapsulation timing measurements. The issue has been fixed in version 0.10.1. As a possible workaround, some compiler options may produce vectorized code that does not leak secret information, however relying on these compiler options as a workaround may not be reliable.

References

Affected packages

Git / github.com/open-quantum-safe/liboqs

Affected ranges

Type
GIT
Repo
https://github.com/open-quantum-safe/liboqs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
GIT
Repo
https://github.com/pq-crystals/kyber
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.10.0
0.2.0
0.3.0
0.4.0
0.5.0
0.6.0
0.6.0-rc1
0.6.0-rc2
0.6.0-rc3
0.7.0
0.7.0-rc3
0.7.0-rc4
0.7.1
0.7.1-rc1
0.7.2
0.7.2-rc1
0.7.2-rc2
0.8.0
0.8.0-rc1
0.9.0
0.9.0-rc1

Other

ietf116

master-0.*

master-0.1.0

v3.*

v3.0