cve-2023-44378
Vulnerability from cvelistv5
Published
2023-10-09 13:33
Modified
2024-09-19 13:52
Severity ?
EPSS score ?
Summary
gnark vulnerable to unsoundness in variable comparison/non-unique binary decomposition
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:07:33.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg" }, { "name": "https://github.com/zkopru-network/zkopru/issues/116", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zkopru-network/zkopru/issues/116" }, { "name": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44378", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:15:07.624734Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:52:13.521Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gnark", "vendor": "Consensys", "versions": [ { "status": "affected", "version": "\u003c 0.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "gnark is a zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.9.0, for some in-circuit values, it is possible to construct two valid decomposition to bits. In addition to the canonical decomposition of `a`, for small values there exists a second decomposition for `a+r` (where `r` is the modulus the values are being reduced by). The second decomposition was possible due to overflowing the field where the values are defined. Upgrading to version 0.9.0 should fix the issue without needing to change the calls to value comparison methods." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191: Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-697", "description": "CWE-697: Incorrect Comparison", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T13:33:54.973Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg" }, { "name": "https://github.com/zkopru-network/zkopru/issues/116", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zkopru-network/zkopru/issues/116" }, { "name": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f" } ], "source": { "advisory": "GHSA-498w-5j49-vqjg", "discovery": "UNKNOWN" }, "title": "gnark vulnerable to unsoundness in variable comparison/non-unique binary decomposition" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-44378", "datePublished": "2023-10-09T13:33:54.973Z", "dateReserved": "2023-09-28T17:56:32.612Z", "dateUpdated": "2024-09-19T13:52:13.521Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-44378\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-10-09T14:15:10.873\",\"lastModified\":\"2023-10-13T18:43:14.230\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"gnark is a zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.9.0, for some in-circuit values, it is possible to construct two valid decomposition to bits. In addition to the canonical decomposition of `a`, for small values there exists a second decomposition for `a+r` (where `r` is the modulus the values are being reduced by). The second decomposition was possible due to overflowing the field where the values are defined. Upgrading to version 0.9.0 should fix the issue without needing to change the calls to value comparison methods.\"},{\"lang\":\"es\",\"value\":\"gnark es una librer\u00eda zk-SNARK que ofrece una API de alto nivel para dise\u00f1ar circuitos. Antes de la versi\u00f3n 0.9.0, para algunos valores en el circuito, era posible construir dos descomposici\u00f3n v\u00e1lida en bits. Adem\u00e1s de la descomposici\u00f3n can\u00f3nica de \\\"a\\\", para valores peque\u00f1os existe una segunda descomposici\u00f3n para \\\"a+r\\\" (donde \\\"r\\\" es el m\u00f3dulo por el que se reducen los valores). La segunda descomposici\u00f3n fue posible debido al desbordamiento del campo donde se definen los valores. La actualizaci\u00f3n a la versi\u00f3n 0.9.0 deber\u00eda solucionar el problema sin necesidad de cambiar las llamadas a los m\u00e9todos de comparaci\u00f3n de valores.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-191\"},{\"lang\":\"en\",\"value\":\"CWE-697\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:consensys:gnark:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.9.0\",\"matchCriteriaId\":\"33F1210A-A393-4C12-B0DF-0F698913487C\"}]}]}],\"references\":[{\"url\":\"https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/zkopru-network/zkopru/issues/116\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Not Applicable\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.