-
Notifications
You must be signed in to change notification settings - Fork 415
Add libcrux-intrinsics entry #2493
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
@franziskuskiefer hey, we usually ask maintainers to confirm that they're okay with publishing an advisory. How do you feel about having this? Any additions to the text? |
|
It seems to be (also) toolchain / build configuration thing, e.g. only stable-aarch64-unknown-linux-musl cryspen/libcrux#1220 (comment) given musl one doesn't expose target_feature="sha3" via build implicitly w/o -Ctarget_cpu="native" / -Ctarget-feature=+sha3 given explicitly per bjorn3 (cryspen/libcrux#1220 (comment)) so I would say it's limited to a particular aarch64 toolchain/s (used implicitly) and/or build configurations (used explicitly) that don't feature SHA3 instruction set either enabled, available or assumed (w/o cpu=native) like was in the case of alpine musl toolchain. |
|
Thank you for creating the issue. We have the following suggestion for the text: |
|
So maybe this should be an advisory for libcrux-intrinsics instead? |
I agree, that makes sense, since the bug was in that crate. |
It would be correct to say that .. or upon compilation when using either a toolchain that does not by default provide SHA3 instruction set enabled or when the SHA3 instruction set was explicitly disabled .. Given even with platforms that support SHA3, the compiler doesn't make assumption through the toolchain (as was the case in linux / musl toolchain) that CPU has such instruction set/s available and where it has to be enabled explicitly. This was the case for me running (in a platform that supports all those features) didn't enable in the virtual host through the toolchain used. Work/around for the aarch64 platforms that are SHA3 capable at runtime, people could always enable SHA3 manually if supported at the runtime environment per bjorn3. People who compiled their projects using the unaffected CPU & target_features with SHA3 enabled are not affected. |
|
Updated to target the right crate and incorporated the text from above. I don't think this advisory is a good place to teach people about |
This is for cryspen/libcrux#1220 but also affects libcrux-ml-kem.
Ideally these can be updated by the maintainers if they do analysis on the relationship between the incorrect signatures/shared secrets and the correct output.