Vulnerability DatabaseRUSTSEC-2024-0354

RUSTSEC-2024-0354
Rust vulnerability analysis and mitigation

Overview

A security vulnerability (RUSTSEC-2024-0354, CVE-2024-40640) was discovered in the vodozemac Rust package affecting versions prior to 0.7.0. The vulnerability involves the usage of a non-constant time base64 decoder that could potentially lead to the leakage of secret key material when importing key material for Megolm group sessions and PkDecryption Ed25519 secret keys (GitHub Advisory).

Technical details

The vulnerability stems from the implementation of base64 operations that do not maintain constant-time execution, potentially exposing timing variations during encoding and decoding operations of secret key material. The severity of this vulnerability is rated as Low, as exploitation requires specific conditions including access to high-precision timing measurements and repeated access to the base64 encoding or decoding processes (GitHub Advisory).

Impact

The vulnerability could allow attackers to observe timing variations in the encoding and decoding operations of the secret key material, potentially providing insights into the underlying secret key material. However, the estimated leakage amount is bounded and considered low according to research findings (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.7.0 of vodozemac, with the fix implemented in commit 734b6c6. No workarounds are available for affected versions, making upgrading to version 0.7.0 or later the only mitigation option (GitHub Advisory).

Community reactions

The vulnerability was responsibly disclosed, with credit given to Soatok for pointing out the relevant research. The Matrix.org security team has provided contact information (security@matrix.org) for further inquiries about this advisory (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65807HIGH8.4
  • RustRust
  • sd
NoNoDec 10, 2025
CVE-2025-66627HIGH7.8
  • RustRust
  • typst
NoYesDec 09, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management