Assigned RUSTSEC-2022-0047 to oqs (#1345)

Co-authored-by: amousset <amousset@users.noreply.github.com>
This commit is contained in:
github-actions[bot]
2022-08-11 15:57:37 +02:00
committed by GitHub
parent e6ddcfcd98
commit 3ee42e2f72
2 changed files with 3 additions and 3 deletions

View File

@@ -1,3 +1,3 @@
This file causes merge conflicts if two ID assignment jobs run concurrently.
This prevents duplicate ID assignment due to a race between those jobs.
cc20badbfdcfe94c12b2ce030582d1c9e928553446082b28cf627cb338f61a90 -
98c8a3a4f0b91dc5b78386122834d867c33b4a4c05f99f1f229242b9619f4961 -

View File

@@ -1,6 +1,6 @@
```toml
[advisory]
id = "RUSTSEC-0000-0000"
id = "RUSTSEC-2022-0047"
package = "oqs"
date = "2022-02-25"
url = "https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KFgw5_qCXiI?pli=1"
@@ -26,4 +26,4 @@ Ward Beullens found a practical key-recovery attack against Rainbow.
The level I parametersets are removed from liboqs starting from version `0.7.2`.
Find the scientific details in [Breaking Rainbow Takes a Weekend on a Laptop](https://eprint.iacr.org/2022/214).
This means all the `oqs::sig::Algorithm::RainbowI*` variants are insecure.
This means all the `oqs::sig::Algorithm::RainbowI*` variants are insecure.