Vulnerability Description
oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. All users are advised to upgrade. There are no workarounds for this issue.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/open-quantum-safe/oqs-provider/pull/416
- https://github.com/open-quantum-safe/oqs-provider/security/advisories/GHSA-pqvr-
- https://github.com/open-quantum-safe/oqs-provider/pull/416
- https://github.com/open-quantum-safe/oqs-provider/security/advisories/GHSA-pqvr-
FAQ
What is CVE-2024-37305?
CVE-2024-37305 is a vulnerability with a CVSS score of 8.2 (HIGH). oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been i...
How severe is CVE-2024-37305?
CVE-2024-37305 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-37305?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.