Skip to content

Improper random reading in CIRCL

Moderate severity GitHub Reviewed Published May 10, 2023 in cloudflare/circl • Updated Nov 6, 2023

Package

gomod github.com/cloudflare/circl (Go)

Affected versions

< 1.3.3

Patched versions

1.3.3

Description

Impact

When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.

The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.

Patches

The fix was introduced in CIRCL v. 1.3.3

References

@mskowroncf mskowroncf published to cloudflare/circl May 10, 2023
Published by the National Vulnerability Database May 10, 2023
Published to the GitHub Advisory Database May 11, 2023
Reviewed May 11, 2023
Last updated Nov 6, 2023

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N

CVE ID

CVE-2023-1732

GHSA ID

GHSA-2q89-485c-9j2x

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.