CVE-2024-36405

NameCVE-2024-36405
Descriptionliboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. A control-flow timing lean has been identified in the reference implementation of the Kyber key encapsulation mechanism when it is compiled with Clang 15-18 for `-Os`, `-O1`, and other compilation options. A proof-of-concept local attack on the reference implementation leaks the entire ML-KEM 512 secret key in ~10 minutes using end-to-end decapsulation timing measurements. The issue has been fixed in version 0.10.1. As a possible workaround, some compiler options may produce vectorized code that does not leak secret information, however relying on these compiler options as a workaround may not be reliable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1073250

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
liboqs (PTS)sid0.8.0-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
liboqssource(unstable)(unfixed)1073250

Notes

https://github.com/open-quantum-safe/liboqs/security/advisories/GHSA-f2v9-5498-2vpp
https://github.com/open-quantum-safe/liboqs/commit/982c762c242ef549c914891b47bf6e0ed6321f91 (main)
https://github.com/open-quantum-safe/liboqs/commit/fbfac754585d788c19b49cac569e4e2ea182f579 (0.10.1-rc1)

Search for package or bug name: Reporting problems