Bug 1223881 (CVE-2024-34063) - VUL-0: CVE-2024-34063: TRACKERBUG: vodozemac: degraded secret zeroization capabilities
Summary: VUL-0: CVE-2024-34063: TRACKERBUG: vodozemac: degraded secret zeroization cap...
Status: NEW
Alias: CVE-2024-34063
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/404259/
Whiteboard:
Keywords:
Depends on: 1223882 1223884
Blocks:
  Show dependency treegraph
 
Reported: 2024-05-03 16:09 UTC by SMASH SMASH
Modified: 2024-05-03 16:15 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-03 16:09:24 UTC
vodozemac is an implementation of Olm and Megolm in pure Rust. Versions 0.5.0 and 0.5.1 of vodozemac have degraded secret zeroization capabilities, due to changes in third-party cryptographic dependencies (the Dalek crates), which moved secret zeroization capabilities behind a feature flag and defaulted this feature to off. The degraded zeroization capabilities could result in the production of more memory copies of encryption secrets and secrets could linger in memory longer than necessary. This marginally increases the risk of sensitive data exposure. This issue has been addressed in version 0.6.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-34063
https://www.cve.org/CVERecord?id=CVE-2024-34063
https://github.com/matrix-org/vodozemac/commit/297548cad4016ce448c4b5007c54db7ee39489d9
https://github.com/matrix-org/vodozemac/security/advisories/GHSA-c3hm-hxwf-g5c6