From faeab0e6494265345ee4285042dcf8c33128e75a Mon Sep 17 00:00:00 2001 From: "pinkforest(she/her)" <36498018+pinkforest@users.noreply.github.com> Date: Thu, 2 Feb 2023 22:32:39 +1100 Subject: [PATCH] Add `matrix-sdk-crypto` (#1550) * Add matrix-sdk-crypto * Oops filename * Fix URL --- crates/matrix-sdk-crypto/RUSTSEC-0000-0000.md | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 crates/matrix-sdk-crypto/RUSTSEC-0000-0000.md diff --git a/crates/matrix-sdk-crypto/RUSTSEC-0000-0000.md b/crates/matrix-sdk-crypto/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..5d36dba --- /dev/null +++ b/crates/matrix-sdk-crypto/RUSTSEC-0000-0000.md @@ -0,0 +1,19 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "matrix-sdk-crypto" +date = "2022-09-29" +url = "https://github.com/matrix-org/matrix-rust-sdk/commit/093fb5d0aa21c0b5eaea6ec96b477f1075271cbb" +references = ["https://github.com/matrix-org/matrix-rust-sdk/commit/41449d2cc360e347f5d4e1c154ec1e3185f11acd"] +aliases = ["CVE-2022-39252", "GHSA-vp68-2wrm-69qm"] +cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + +[versions] +patched = [">= 0.6.0"] +``` + +# matrix-sdk Impersonation of room keys + +When the user receives a forwarded room key, the software accepts it without +checking who the room key came from. This allows homeservers to try to insert +room keys of questionable validity, potentially mounting an impersonation attack.