CVE-2024-37305

oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. All users are advised to upgrade. There are no workarounds for this issue.
Configurations

No configuration.

History

No history.

Information

Published : 2024-06-17 20:15

Updated : 2024-06-20 12:44


NVD link : CVE-2024-37305

Mitre link : CVE-2024-37305

CVE.ORG link : CVE-2024-37305


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-130

Improper Handling of Length Parameter Inconsistency

CWE-190

Integer Overflow or Wraparound

CWE-680

Integer Overflow to Buffer Overflow

CWE-805

Buffer Access with Incorrect Length Value