Lucene search

K
osvGoogleOSV:RUSTSEC-2024-0342
HistoryMay 02, 2024 - 12:00 p.m.

Degraded secret zeroization capabilities

2024-05-0212:00:00
Google
osv.dev
1
vodozemac
zeroization
cryptographic dependencies
memory copies
sensitive data
exposure

2.5 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Versions 0.5.0 and 0.5.1 of vodozemac have degraded secret zeroization capabilities,
due to changes in third-party cryptographic dependencies (the Dalek crates),
which moved secret zeroization capabilities behind a feature flag while
vodozemac disabled the default feature set.

Impact

The degraded zeroization capabilities could result in the production of more
memory copies of encryption secrets and secrets could linger in memory longer
than necessary. This marginally increases the risk of sensitive data exposure.

Overall, we consider the impact of this issue to be low. Although cryptographic
best practices recommend the clearing of sensitive information from memory once
it’s no longer needed, the inherent limitations of Rust regarding absolute
zeroization reduce the practical severity of this lapse.

CPENameOperatorVersion
vodozemaclt0.6.0
vodozemacge0.5.0

2.5 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for OSV:RUSTSEC-2024-0342