CVE-2024-21530

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-21530
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21530.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-21530
Aliases
Published
2024-10-02T05:15:11Z
Modified
2024-10-08T04:11:51.783273Z
Summary
[none]
Details

Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object.

Note: The issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng.

References

Affected packages

Git / github.com/fadeevab/cocoon

Affected ranges

Type
GIT
Repo
https://github.com/fadeevab/cocoon
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed