CVE-2024-37305 Affecting liboqs-devel package, versions <0.12.0-150600.3.3.1


Severity

Recommended
0.0
high
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES156-LIBOQSDEVEL-8602040
  • published4 Jan 2025
  • disclosed2 Jan 2025

Introduced: 2 Jan 2025

NewCVE-2024-37305  (opens in a new tab)

How to fix?

Upgrade SLES:15.6 liboqs-devel to version 0.12.0-150600.3.3.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream liboqs-devel package and not the liboqs-devel package as distributed by SLES. See How to fix? for SLES:15.6 relevant fixed versions and status.

oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. All users are advised to upgrade. There are no workarounds for this issue.

CVSS Scores

version 3.1