diff --git a/crates/oqs/RUSTSEC-0000-0000.md b/crates/oqs/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..ce5de73 --- /dev/null +++ b/crates/oqs/RUSTSEC-0000-0000.md @@ -0,0 +1,29 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "oqs" +date = "2022-02-25" +url = "https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KFgw5_qCXiI?pli=1" +categories = ["crypto-failure"] + +# affected enum variants ([affected.functions] requires functions) +#"oqs::sig::Algorithm::RainbowIaClassic" = ["< 0.5.0, >= 0.2.0"] +#"oqs::sig::Algorithm::RainbowIaCyclic" = ["< 0.5.0, >= 0.2.0"] +#"oqs::sig::Algorithm::RainbowIaCyclicCompressed" = ["< 0.5.0, >= 0.2.0"] +#"oqs::sig::Algorithm::RainbowIClassic" = ["< 0.7.2, >= 0.5.0"] +#"oqs::sig::Algorithm::RainbowICircumzenithal" = ["< 0.7.2, >= 0.5.0"] +#"oqs::sig::Algorithm::RainbowICompressed" = ["< 0.7.2, >= 0.5.0"] + + +# Versions which include fixes for this vulnerability (mandatory) +[versions] +patched = [">= 0.7.2"] +``` + +# Post-Quantum Signature scheme Rainbow level I parametersets broken + +Ward Beullens found a practical key-recovery attack against Rainbow. +The level I parametersets are removed from liboqs starting from version `0.7.2`. +Find the scientific details in [Breaking Rainbow Takes a Weekend on a Laptop](https://eprint.iacr.org/2022/214). + +This means all the `oqs::sig::Algorithm::RainbowI*` variants are insecure. \ No newline at end of file