
CVE-2024-50354 – Out-of-memory during deserialization with crafted inputs
https://notcve.org/view.php?id=CVE-2024-50354
31 Oct 2024 — gnark is a fast zk-SNARK library that offers a high-level API to design circuits. In gnark 0.11.0 and earlier, deserialization of Groth16 verification keys allocate excessive memory, consuming a lot of resources and triggering a crash with the error fatal error: runtime: out of memory. • https://github.com/Consensys/gnark/commit/47ae846339add2bdf9983e499342bfdfe195191d • CWE-400: Uncontrolled Resource Consumption •

CVE-2024-45039 – gnark's Groth16 commitment extension unsound for more than one commitment
https://notcve.org/view.php?id=CVE-2024-45039
06 Sep 2024 — gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Versions prior to 0.11.0 have a soundness issue - in case of multiple commitments used inside the circuit the prover is able to choose all but the last commitment. As gnark uses the commitments for optimized non-native multiplication, lookup checks etc. as random challenges, then it could impact the soundness of the whole circuit. However, using multiple commitments has been discouraged due to the additional cost to the verifi... • https://github.com/Consensys/gnark/commit/e7c66b000454f4d2a4ae48c005c34154d4cfc2a2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-45040 – gnark's commitments to private witnesses in Groth16 as implemented break zero-knowledge property
https://notcve.org/view.php?id=CVE-2024-45040
06 Sep 2024 — gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.11.0, commitments to private witnesses in Groth16 as implemented break the zero-knowledge property. The vulnerability affects only Groth16 proofs with commitments. Notably, PLONK proofs are not affected. The vulnerability affects the zero-knowledge property of the proofs - in case the witness (secret or internal) values are small, then the attacker may be able to enumerate all possible choices to deduce the ... • https://github.com/Consensys/gnark/commit/afda68a38acca37becb8ba6d8982d03fee9559a0 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-23688 – Consensys Discovery Nonce Reuse
https://notcve.org/view.php?id=CVE-2024-23688
19 Jan 2024 — Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed. Las versiones de Consensys Discovery inferiores a 0.4.5 utilizan el mismo nonce AES/GCM durante toda la sesión que idealmente debería ser único para cada mensaje. La clave privada del nodo no está comprometida, solo se expone la clave de sesión gen... • https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g • CWE-323: Reusing a Nonce, Key Pair in Encryption CWE-330: Use of Insufficiently Random Values •

CVE-2023-44378 – gnark vulnerable to unsoundness in variable comparison/non-unique binary decomposition
https://notcve.org/view.php?id=CVE-2023-44378
09 Oct 2023 — gnark is a zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.9.0, for some in-circuit values, it is possible to construct two valid decomposition to bits. In addition to the canonical decomposition of `a`, for small values there exists a second decomposition for `a+r` (where `r` is the modulus the values are being reduced by). The second decomposition was possible due to overflowing the field where the values are defined. Upgrading to version 0.9.0 should fix the issue wit... • https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f • CWE-191: Integer Underflow (Wrap or Wraparound) CWE-697: Incorrect Comparison •

CVE-2023-44273
https://notcve.org/view.php?id=CVE-2023-44273
28 Sep 2023 — Consensys gnark-crypto through 0.11.2 allows Signature Malleability. This occurs because deserialisation of EdDSA and ECDSA signatures does not ensure that the data is in a certain interval. Consensys gnark-crypto hasta 0.11.2 permite maleabilidad de firma. Esto ocurre porque la deserialización de las firmas EdDSA y ECDSA no garantiza que los datos estén en un intervalo determinado. • https://github.com/Consensys/gnark-crypto/pull/449 • CWE-502: Deserialization of Untrusted Data •