2024-12-08 03:06:42 +00:00

72 lines
3.5 KiB
JSON

{
"id": "CVE-2024-34063",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-03T10:15:08.690",
"lastModified": "2024-11-21T09:18:00.687",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "vodozemac is an implementation of Olm and Megolm in pure Rust. Versions 0.5.0 and 0.5.1 of vodozemac have degraded secret zeroization capabilities, due to changes in third-party cryptographic dependencies (the Dalek crates), which moved secret zeroization capabilities behind a feature flag and defaulted this feature to off. The degraded zeroization capabilities could result in the production of more memory copies of encryption secrets and secrets could linger in memory longer than necessary. This marginally increases the risk of sensitive data exposure. This issue has been addressed in version 0.6.0 and users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "vodozemac es una implementaci\u00f3n de Olm y Megolm en Rust puro. Las versiones 0.5.0 y 0.5.1 de vodozemac han degradado las capacidades de puesta a cero secreta, debido a cambios en las dependencias criptogr\u00e1ficas de terceros (las cajas Dalek), que movieron las capacidades de puesta a cero secreta detr\u00e1s de un indicador de caracter\u00edstica y desactivaron esta caracter\u00edstica de forma predeterminada. Las capacidades degradadas de puesta a cero podr\u00edan dar como resultado la producci\u00f3n de m\u00e1s copias de memoria de secretos de cifrado y los secretos podr\u00edan permanecer en la memoria m\u00e1s tiempo del necesario. Esto aumenta marginalmente el riesgo de exposici\u00f3n de datos confidenciales. Este problema se solucion\u00f3 en la versi\u00f3n 0.6.0 y se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.5,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
]
}
],
"references": [
{
"url": "https://github.com/matrix-org/vodozemac/commit/297548cad4016ce448c4b5007c54db7ee39489d9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/matrix-org/vodozemac/security/advisories/GHSA-c3hm-hxwf-g5c6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/matrix-org/vodozemac/commit/297548cad4016ce448c4b5007c54db7ee39489d9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/matrix-org/vodozemac/security/advisories/GHSA-c3hm-hxwf-g5c6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}