We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-34353

matrix-sdk-crypto contains a log exposure of private key of the server-side key backup



Description

The matrix-sdk-crypto crate, part of the Matrix Rust SDK project, is an implementation of a Matrix end-to-end encryption state machine in Rust. In Matrix, the server-side `key backup` stores encrypted copies of Matrix message keys. This facilitates key sharing between a user's devices and provides a redundant copy in case all devices are lost. The key backup uses asymmetric cryptography, with each server-side key backup assigned a unique public-private key pair. Due to a logic bug introduced in commit 71136e44c03c79f80d6d1a2446673bc4d53a2067, matrix-sdk-crypto version 0.7.0 will sometimes log the private part of the backup key pair to Rust debug logs (using the `tracing` crate). This issue has been resolved in matrix-sdk-crypto version 0.7.1. No known workarounds are available.

Reserved 2024-05-02 | Published 2024-05-13 | Updated 2024-08-02 | Assigner GitHub_M


MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-532: Insertion of Sensitive Information into Log File

Product status

= 0.7.0
affected

References

github.com/...st-sdk/security/advisories/GHSA-9ggc-845v-gcgv

github.com/...ommit/71136e44c03c79f80d6d1a2446673bc4d53a2067

github.com/...ommit/fa10bbb5dd0f9120a51aa1854cec752e25790bb0

crates.io/crates/matrix-sdk-crypto/0.7.1

github.com/...-rust-sdk/releases/tag/matrix-sdk-crypto-0.7.1

cve.org (CVE-2024-34353)

nvd.nist.gov (CVE-2024-34353)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-34353

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.