Description
The Kyber reference implementation before 9b8d306, when compiled by LLVM Clang through 18.x with some common optimization options, has a timing side channel that allows attackers to recover an ML-KEM 512 secret key in minutes. This occurs because poly_frommsg in poly.c does not prevent Clang from emitting a vulnerable secret-dependent branch.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T03:57:39.987Z
Reserved: 2024-06-10T00:00:00.000Z
Link: CVE-2024-37880
Updated: 2024-08-02T03:57:39.987Z
Status : Modified
Published: 2024-06-10T02:15:47.160
Modified: 2024-11-21T09:24:27.287
Link: CVE-2024-37880
No data.
OpenCVE Enrichment
No data.
Weaknesses