All the vulnerabilites related to Consensys - gnark
cve-2023-44378
Vulnerability from cvelistv5
Published
2023-10-09 13:33
Modified
2024-09-19 13:52
Severity ?
EPSS score ?
Summary
gnark vulnerable to unsoundness in variable comparison/non-unique binary decomposition
References
▼ | URL | Tags |
---|---|---|
https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg | x_refsource_CONFIRM | |
https://github.com/zkopru-network/zkopru/issues/116 | x_refsource_MISC | |
https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:07:33.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg" }, { "name": "https://github.com/zkopru-network/zkopru/issues/116", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zkopru-network/zkopru/issues/116" }, { "name": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44378", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:15:07.624734Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:52:13.521Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gnark", "vendor": "Consensys", "versions": [ { "status": "affected", "version": "\u003c 0.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "gnark is a zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.9.0, for some in-circuit values, it is possible to construct two valid decomposition to bits. In addition to the canonical decomposition of `a`, for small values there exists a second decomposition for `a+r` (where `r` is the modulus the values are being reduced by). The second decomposition was possible due to overflowing the field where the values are defined. Upgrading to version 0.9.0 should fix the issue without needing to change the calls to value comparison methods." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191: Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-697", "description": "CWE-697: Incorrect Comparison", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T13:33:54.973Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg" }, { "name": "https://github.com/zkopru-network/zkopru/issues/116", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zkopru-network/zkopru/issues/116" }, { "name": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f" } ], "source": { "advisory": "GHSA-498w-5j49-vqjg", "discovery": "UNKNOWN" }, "title": "gnark vulnerable to unsoundness in variable comparison/non-unique binary decomposition" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-44378", "datePublished": "2023-10-09T13:33:54.973Z", "dateReserved": "2023-09-28T17:56:32.612Z", "dateUpdated": "2024-09-19T13:52:13.521Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-50354
Vulnerability from cvelistv5
Published
2024-10-31 15:59
Modified
2024-10-31 16:53
Severity ?
EPSS score ?
Summary
Out-of-memory during deserialization with crafted inputs
References
▼ | URL | Tags |
---|---|---|
https://github.com/Consensys/gnark/security/advisories/GHSA-cph5-3pgr-c82g | x_refsource_CONFIRM | |
https://github.com/Consensys/gnark/pull/1307 | x_refsource_MISC | |
https://github.com/Consensys/gnark/commit/47ae846339add2bdf9983e499342bfdfe195191d | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:consensys:gnark:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gnark", "vendor": "consensys", "versions": [ { "lessThanOrEqual": "0.11.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-50354", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-31T16:52:29.171674Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-31T16:53:21.298Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gnark", "vendor": "Consensys", "versions": [ { "status": "affected", "version": "\u003c= 0.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. In gnark 0.11.0 and earlier, deserialization of Groth16 verification keys allocate excessive memory, consuming a lot of resources and triggering a crash with the error fatal error: runtime: out of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-31T15:59:30.063Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Consensys/gnark/security/advisories/GHSA-cph5-3pgr-c82g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-cph5-3pgr-c82g" }, { "name": "https://github.com/Consensys/gnark/pull/1307", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Consensys/gnark/pull/1307" }, { "name": "https://github.com/Consensys/gnark/commit/47ae846339add2bdf9983e499342bfdfe195191d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Consensys/gnark/commit/47ae846339add2bdf9983e499342bfdfe195191d" } ], "source": { "advisory": "GHSA-cph5-3pgr-c82g", "discovery": "UNKNOWN" }, "title": "Out-of-memory during deserialization with crafted inputs" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-50354", "datePublished": "2024-10-31T15:59:30.063Z", "dateReserved": "2024-10-22T17:54:40.958Z", "dateUpdated": "2024-10-31T16:53:21.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45040
Vulnerability from cvelistv5
Published
2024-09-06 12:53
Modified
2024-09-06 13:57
Severity ?
EPSS score ?
Summary
gnark's commitments to private witnesses in Groth16 as implemented break zero-knowledge property
References
▼ | URL | Tags |
---|---|---|
https://github.com/Consensys/gnark/security/advisories/GHSA-9xcg-3q8v-7fq6 | x_refsource_CONFIRM | |
https://github.com/Consensys/gnark/pull/1245 | x_refsource_MISC | |
https://github.com/Consensys/gnark/commit/afda68a38acca37becb8ba6d8982d03fee9559a0 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:consensys:gnark:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gnark", "vendor": "consensys", "versions": [ { "lessThanOrEqual": "0.11.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45040", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-06T13:57:02.916086Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T13:57:49.796Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gnark", "vendor": "Consensys", "versions": [ { "status": "affected", "version": "\u003c 0.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.11.0, commitments to private witnesses in Groth16 as implemented break the zero-knowledge property. The vulnerability affects only Groth16 proofs with commitments. Notably, PLONK proofs are not affected. The vulnerability affects the zero-knowledge property of the proofs - in case the witness (secret or internal) values are small, then the attacker may be able to enumerate all possible choices to deduce the actual value. If the possible choices for the variables to be committed is large or there are many values committed, then it would be computationally infeasible to enumerate all valid choices. It doesn\u0027t affect the completeness/soundness of the proofs. The vulnerability has been fixed in version 0.11.0. The patch to fix the issue is to add additional randomized value to the list of committed value at proving time to mask the rest of the values which were committed. As a workaround, the user can manually commit to a randomized value." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-06T12:53:30.622Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Consensys/gnark/security/advisories/GHSA-9xcg-3q8v-7fq6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-9xcg-3q8v-7fq6" }, { "name": "https://github.com/Consensys/gnark/pull/1245", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Consensys/gnark/pull/1245" }, { "name": "https://github.com/Consensys/gnark/commit/afda68a38acca37becb8ba6d8982d03fee9559a0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Consensys/gnark/commit/afda68a38acca37becb8ba6d8982d03fee9559a0" } ], "source": { "advisory": "GHSA-9xcg-3q8v-7fq6", "discovery": "UNKNOWN" }, "title": "gnark\u0027s commitments to private witnesses in Groth16 as implemented break zero-knowledge property" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45040", "datePublished": "2024-09-06T12:53:30.622Z", "dateReserved": "2024-08-21T17:53:51.330Z", "dateUpdated": "2024-09-06T13:57:49.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45039
Vulnerability from cvelistv5
Published
2024-09-06 12:56
Modified
2024-09-06 13:59
Severity ?
EPSS score ?
Summary
gnark's Groth16 commitment extension unsound for more than one commitment
References
▼ | URL | Tags |
---|---|---|
https://github.com/Consensys/gnark/security/advisories/GHSA-q3hw-3gm4-w5cr | x_refsource_CONFIRM | |
https://github.com/Consensys/gnark/commit/e7c66b000454f4d2a4ae48c005c34154d4cfc2a2 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:consensys:gnark:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gnark", "vendor": "consensys", "versions": [ { "lessThan": "0.11.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45039", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-06T13:58:43.116066Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T13:59:16.727Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gnark", "vendor": "Consensys", "versions": [ { "status": "affected", "version": "\u003c 0.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Versions prior to 0.11.0 have a soundness issue - in case of multiple commitments used inside the circuit the prover is able to choose all but the last commitment. As gnark uses the commitments for optimized non-native multiplication, lookup checks etc. as random challenges, then it could impact the soundness of the whole circuit. However, using multiple commitments has been discouraged due to the additional cost to the verifier and it has not been supported in the recursive in-circuit Groth16 verifier and Solidity verifier. gnark\u0027s maintainers expect the impact of the issue be very small - only for the users who have implemented the native Groth16 verifier or are using it with multiple commitments. We do not have information of such users. The issue has been patched in version 0.11.0. As a workaround, users should follow gnark maintainers\u0027 recommendation to use only a single commitment and then derive in-circuit commitments as needed using the `std/multicommit` package." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-06T12:56:15.080Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Consensys/gnark/security/advisories/GHSA-q3hw-3gm4-w5cr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-q3hw-3gm4-w5cr" }, { "name": "https://github.com/Consensys/gnark/commit/e7c66b000454f4d2a4ae48c005c34154d4cfc2a2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Consensys/gnark/commit/e7c66b000454f4d2a4ae48c005c34154d4cfc2a2" } ], "source": { "advisory": "GHSA-q3hw-3gm4-w5cr", "discovery": "UNKNOWN" }, "title": "gnark\u0027s Groth16 commitment extension unsound for more than one commitment" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45039", "datePublished": "2024-09-06T12:56:15.080Z", "dateReserved": "2024-08-21T17:53:51.330Z", "dateUpdated": "2024-09-06T13:59:16.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }