The vulnerability, known as RUSTSEC-2022-0093, impacts the
ed25519-dalek crate, which is a dependency of the
rusty-paseto crate. This issue arises from a "Double Public Key Signing Function Oracle Attack" affecting versions of
ed25519-dalek prior to v2.0. These versions expose an unsafe API for serializing and deserializing 64-byte keypairs that include both private and public keys, creating potential for certain attacks.
d25519-dalek users utilizing these serialization and deserialization functions directly could potentially be impacted.
The vulnerability within the
ed25519-dalek crate has been addressed in version 2.0.
rusty-paseto has addressed it in release v0.6.0.
Users are recommended to upgrade to v0.6.0 of
rusty-paseto. However, users should still ensure that their key serialization and deserialization practices are secure and avoid any practices that could lead to key exposure.
More information about RUSTSEC-2022-0093 can be found in the RustSec Advisory Database. Updates and details regarding the upcoming release of
rusty-paseto will be documented in the project's releases and changelog. This issue was first reported by Dependabot on 2023-08-15. The source was reviewed by @rrrodzilla at that time and a determination was made that the vulnerability low harm to existing users due to the strongly typed nature of keys provided by the rusty-paseto API. @techport-om reported the vulnerability to the repository by discovering during a
cargo-audit run on 2023-11-05 and opened issue 28. This advisory was created at that time to notify existing users.