Description:
Coinbase researchers reported 2 security issues in our implementation of the oblivious transfer (OT) based protocol DKLS:
1. Secret share recovery attack
If the base OT setup of the protocol is reused for another execution of the OT extension, then a malicious participant can extract a bit of the secret of another participant. By repeating the execution they can eventually recover the whole secret.
Therefore, unlike our comments suggested, you must not reuse an OT setup for multiple protocol executions.
Advisory GHSA-7f6p-phw2-8253 references a vulnerability in the following Go modules:
Description: Coinbase researchers reported 2 security issues in our implementation of the oblivious transfer (OT) based protocol DKLS:
1. Secret share recovery attack
If the base OT setup of the protocol is reused for another execution of the OT extension, then a malicious participant can extract a bit of the secret of another participant. By repeating the execution they can eventually recover the whole secret.
Therefore, unlike our comments suggested, you must not reuse an OT setup for multiple protocol executions.
We're adding a warning in the code:
h...
References:
No existing reports found with this module or alias. See doc/quickstart.md for instructions on how to triage this report.