From 6c890708d514eb7614554a9bbfbdb8b95fbab3a9 Mon Sep 17 00:00:00 2001 From: Denis Varlakov Date: Sun, 10 Nov 2024 14:58:43 +0100 Subject: [PATCH] Add advisory for unambigious challenge derivation in cggmp21 (#2012) --- crates/cggmp21-keygen/RUSTSEC-0000-0000.md | 19 +++++++++++++++++++ crates/cggmp21/RUSTSEC-0000-0000.md | 19 +++++++++++++++++++ crates/paillier-zk/RUSTSEC-0000-0000.md | 19 +++++++++++++++++++ 3 files changed, 57 insertions(+) create mode 100644 crates/cggmp21-keygen/RUSTSEC-0000-0000.md create mode 100644 crates/cggmp21/RUSTSEC-0000-0000.md create mode 100644 crates/paillier-zk/RUSTSEC-0000-0000.md diff --git a/crates/cggmp21-keygen/RUSTSEC-0000-0000.md b/crates/cggmp21-keygen/RUSTSEC-0000-0000.md new file mode 100644 index 00000000..3746d737 --- /dev/null +++ b/crates/cggmp21-keygen/RUSTSEC-0000-0000.md @@ -0,0 +1,19 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" + +package = "cggmp21-keygen" +date = "2024-07-18" +url = "https://github.com/dfns/cggmp21/pull/103" +categories = ["crypto-failure"] + +keywords = ["mpc", "tss", "zkp"] + +[versions] +patched = [">= 0.3.0"] +``` + +# Ambiguous challenge derivation + +Challenge derivation in non-interactive ZK proofs was ambiguous and that could lead +to security vulnerability (however, it's unknown if it could be exploited). diff --git a/crates/cggmp21/RUSTSEC-0000-0000.md b/crates/cggmp21/RUSTSEC-0000-0000.md new file mode 100644 index 00000000..6110328b --- /dev/null +++ b/crates/cggmp21/RUSTSEC-0000-0000.md @@ -0,0 +1,19 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" + +package = "cggmp21" +date = "2024-07-18" +url = "https://github.com/dfns/cggmp21/pull/103" +categories = ["crypto-failure"] + +keywords = ["mpc", "tss", "zkp"] + +[versions] +patched = [">= 0.4.0"] +``` + +# Ambiguous challenge derivation + +Challenge derivation in non-interactive ZK proofs was ambiguous and that could lead +to security vulnerability (however, it's unknown if it could be exploited). diff --git a/crates/paillier-zk/RUSTSEC-0000-0000.md b/crates/paillier-zk/RUSTSEC-0000-0000.md new file mode 100644 index 00000000..666993db --- /dev/null +++ b/crates/paillier-zk/RUSTSEC-0000-0000.md @@ -0,0 +1,19 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" + +package = "paillier-zk" +date = "2024-07-18" +url = "https://github.com/dfns/paillier-zk/pull/49" +categories = ["crypto-failure"] + +keywords = ["mpc", "tss", "zkp"] + +[versions] +patched = [">= 0.4.0"] +``` + +# Ambiguous challenge derivation + +Challenge derivation in non-interactive ZK proofs was ambiguous and that could lead +to security vulnerability (however, it's unknown if it could be exploited).