CVE-2024-34063

Source
https://cve.org/CVERecord?id=CVE-2024-34063
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-34063.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-34063
Aliases
Downstream
Related
Published
2024-05-03T09:52:28.758Z
Modified
2026-03-03T02:53:51.762230Z
Severity
  • 2.5 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Degraded secret zeroization capabilities in vodozemac
Details

vodozemac is an implementation of Olm and Megolm in pure Rust. Versions 0.5.0 and 0.5.1 of vodozemac have degraded secret zeroization capabilities, due to changes in third-party cryptographic dependencies (the Dalek crates), which moved secret zeroization capabilities behind a feature flag and defaulted this feature to off. The degraded zeroization capabilities could result in the production of more memory copies of encryption secrets and secrets could linger in memory longer than necessary. This marginally increases the risk of sensitive data exposure. This issue has been addressed in version 0.6.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-1188"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/34xxx/CVE-2024-34063.json"
}
References

Affected packages

Git / github.com/matrix-org/vodozemac

Affected ranges

Type
GIT
Repo
https://github.com/matrix-org/vodozemac
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-34063.json"