Security update for liboqs, oqs-provider
Announcement ID: |
SUSE-SU-2025:0005-1 |
Release Date: |
2025-01-02T08:01:46Z |
Rating: |
important |
References: |
|
Cross-References:
|
|
CVSS scores: |
-
CVE-2024-36405
(
SUSE
):
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
-
CVE-2024-37305
(
SUSE
):
8.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
-
CVE-2024-54137
(
SUSE
):
7.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
-
CVE-2024-54137
(
NVD
):
7.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
|
Affected Products: |
- Basesystem Module 15-SP6
- openSUSE Leap 15.6
- SUSE Linux Enterprise Desktop 15 SP6
- SUSE Linux Enterprise Real Time 15 SP6
- SUSE Linux Enterprise Server 15 SP6
- SUSE Linux Enterprise Server for SAP Applications 15 SP6
|
An update that solves three vulnerabilities can now be installed.
Description:
This update for liboqs, oqs-provider fixes the following issues:
This update supplies the new FIPS standardized ML-KEM, ML-DSA, SHL-DSA algorithms.
This update liboqs to 0.12.0:
- This release updates the ML-DSA implementation to the final
FIPS 204 version. This
release still includes the NIST Round 3 version of Dilithium for
interoperability purposes, but we plan to remove Dilithium Round 3 in
a future release.
- This will be the last release of liboqs to include Kyber (that is,
the NIST Round 3 version of Kyber, prior to its standardization by NIST
as ML-KEM in FIPS 203). Applications should switch to ML-KEM (FIPS 203).
- The addition of ML-DSA FIPS 204 final version to liboqs has
introduced a new signature API which includes a context string
parameter. We are planning to remove the old version of the API
without a context string in the next release to streamline the
API and bring it in line with NIST specifications. Users who
have an opinion on this removal are invited to provide input at
https://github.com/open-quantum-safe/liboqs/issues/2001.
Security issues:
- CVE-2024-54137: Fixed bug in HQC decapsulation that leads to incorrect
shared secret value during decapsulation when called with an invalid
ciphertext. (bsc#1234292)
- new library major version 7
Updated to 0.11.0:
Updated to 0.10.1:
- This release is a security release which fixes potential
non-constant-time behaviour in ML-KEM and Kyber. (bsc#1226162
CVE-2024-36405)
It also includes a fix for incorrectly named macros in the ML-DSA
implementation.
updated to 0.10.0:
Key encapsulation mechanisms:
- BIKE: Updated portable C implementation to include constant-time fixes from upstream.
- HQC: Updated to NIST Round 4 version.
- ML-KEM: Added portable C and AVX2 implementations of Initial Public Draft (IPD) versions of ML-KEM-512, ML-KEM-768, and ML-KEM-1024.
Digital signature schemes:
- Falcon: Updated portable C, AVX2, and AArch64 implementations to support fixed-length (PADDED-format) signatures. Fixed the maximum length of variable-length signatures to comply with the NIST Round 3 specification.
- ML-DSA: Added portable C and AVX2 implementations of Initial Public Draft (IPD) versions of ML-DSA-44, ML-DSA-65, and ML-DSA-87.
Other changes:
This update also updates oqs-provider to 0.7.0:
- Adds support for MAYO from Round 1 of NIST’s Post-Quantum Signature On-Ramp process.
- Adds support for CROSS from Round 1 of NIST’s Post-Quantum Signature On-Ramp process.
- Updates ML-KEM's code points in line with internet draft draft-kwiatkowski-tls-ecdhe-mlkem-02.
- Reverses keyshares for X25519MLKEM768 and X448-ML-KEM-768 TLS hybrids in line with draft-kwiatkowski-tls-ecdhe-mlkem-02.
Updated to 0.6.1:
- CVE-2024-37305: Fixed buffer overflow in deserialization of hybrid keys and signatures (bsc#1226468)
Updated to 0.6.0:
- First availability of standardized PQ algorithms, e.g., ML-KEM, ML-DSA
- Support for Composite PQ operations
- Alignment with PQ algorithm implementations as provided by liboqs 0.10.0, most notably updating HQC and Falcon.
- Implementation of security code review recommendations
- Support for more hybrid operations as fully documented here.
- Support for extraction of classical and hybrid key material
Updated to 0.5.3:
- only tracking parallel liboqs security update
Updated to 0.5.2:
- Algorithm updates as documented in the liboqs 0.9.0 release notes
- Standard coding style
- Enhanced memory leak protection
- Added community cooperation documentation
- (optional) KEM algorithm en-/decoder feature
Updated to 0.5.1:
- Documentation update
- document specs
- General documentation overhaul
- change TLS demo to use QSC alg
- Build a module instead of a shared library.
- explain groups in USAGE
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch SUSE-2025-5=1 openSUSE-SLE-15.6-2025-5=1
-
Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-5=1
Package List:
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
- oqs-provider-debuginfo-0.7.0-150600.3.3.1
- liboqs7-debuginfo-0.12.0-150600.3.3.1
- oqs-provider-0.7.0-150600.3.3.1
- liboqs7-0.12.0-150600.3.3.1
- liboqs-devel-0.12.0-150600.3.3.1
-
openSUSE Leap 15.6 (x86_64)
- liboqs7-32bit-0.12.0-150600.3.3.1
- liboqs7-32bit-debuginfo-0.12.0-150600.3.3.1
- liboqs-devel-32bit-0.12.0-150600.3.3.1
-
openSUSE Leap 15.6 (aarch64_ilp32)
- liboqs7-64bit-0.12.0-150600.3.3.1
- liboqs-devel-64bit-0.12.0-150600.3.3.1
- liboqs7-64bit-debuginfo-0.12.0-150600.3.3.1
-
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
- oqs-provider-debuginfo-0.7.0-150600.3.3.1
- liboqs7-debuginfo-0.12.0-150600.3.3.1
- oqs-provider-0.7.0-150600.3.3.1
- liboqs7-0.12.0-150600.3.3.1
- liboqs-devel-0.12.0-150600.3.3.1
References: