-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| cocoon | rust | < 0.4.0 | 0.4.0 |
The vulnerability stemmed from RNG cloning in encryption functions. The commit 1b63921 modified these functions to take &mut self and removed RNG cloning. Pre-patch versions would reset the RNG state (particularly StdRng) when cloned, causing nonce reuse. The affected functions are clearly identified in the commit diff and RustSec advisory as encrypt/wrap/dump in both Cocoon and MiniCocoon implementations. ThreadRng-based instances were not affected because they don't expose this cloning behavior.
A Semantic Attack on Google Gemini - Read the Latest Research