CVE-2024-37880
10.06.2024, 02:15
The Kyber reference implementation before 9b8d306, when compiled by LLVM Clang through 18.x with some common optimization options, has a timing side channel that allows attackers to recover an ML-KEM 512 secret key in minutes. This occurs because poly_frommsg in poly.c does not prevent Clang from emitting a vulnerable secret-dependent branch.Enginsight
Vendor | Product | Version |
---|---|---|
pq-crystals | kyber | 𝑥 < 2024-06-03 |
𝑥
= Vulnerable software versions
References