CVE-2024-45040

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-45040
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-45040.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-45040
Aliases
Withdrawn
2024-09-21T01:05:22.554091Z
Published
2024-09-06T13:15:04Z
Modified
2024-09-20T01:54:36.359628Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.11.0, commitments to private witnesses in Groth16 as implemented break the zero-knowledge property. The vulnerability affects only Groth16 proofs with commitments. Notably, PLONK proofs are not affected. The vulnerability affects the zero-knowledge property of the proofs - in case the witness (secret or internal) values are small, then the attacker may be able to enumerate all possible choices to deduce the actual value. If the possible choices for the variables to be committed is large or there are many values committed, then it would be computationally infeasible to enumerate all valid choices. It doesn't affect the completeness/soundness of the proofs. The vulnerability has been fixed in version 0.11.0. The patch to fix the issue is to add additional randomized value to the list of committed value at proving time to mask the rest of the values which were committed. As a workaround, the user can manually commit to a randomized value.

References

Affected packages

Git / github.com/consensys/gnark

Affected ranges

Type
GIT
Repo
https://github.com/consensys/gnark
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0-alpha
v0.10.0
v0.2.0-alpha
v0.2.1-alpha
v0.3.0
v0.3.0-alpha
v0.3.1
v0.3.3
v0.3.4
v0.3.5
v0.3.6
v0.3.7
v0.3.8
v0.4.0
v0.5.0
v0.5.1
v0.5.2
v0.6.0
v0.6.1
v0.6.2
v0.6.3
v0.6.4
v0.7.0
v0.7.1
v0.8.0
v0.8.1
v0.9.0
v0.9.0-alpha
v0.9.1