The vulnerability, known as RUSTSEC-2022-0093, impacts the ed25519-dalek
crate, which is a dependency of the rusty-paseto
crate. This issue arises from a "Double Public Key Signing Function Oracle Attack" affecting versions of ed25519-dalek
prior to v2.0. These versions expose an unsafe API for serializing and deserializing 64-byte keypairs that include both private and public keys, creating potential for certain attacks. d25519-dalek
users utilizing these serialization and deserialization functions directly could potentially be impacted.
The vulnerability within the ed25519-dalek
crate has been addressed in version 2.0. rusty-paseto
has addressed it in release v0.6.0.
Users are recommended to upgrade to v0.6.0 of rusty-paseto
. However, users should still ensure that their key serialization and deserialization practices are secure and avoid any practices that could lead to key exposure.
More information about RUSTSEC-2022-0093 can be found in the RustSec Advisory Database. Updates and details regarding the upcoming release of rusty-paseto
will be documented in the project's releases and changelog. This issue was first reported by Dependabot on 2023-08-15. The source was reviewed by @rrrodzilla at that time and a determination was made that the vulnerability low harm to existing users due to the strongly typed nature of keys provided by the rusty-paseto API. @techport-om reported the vulnerability to the repository by discovering during a cargo-audit
run on 2023-11-05 and opened issue 28. This advisory was created at that time to notify existing users.
{ "nvd_published_at": null, "cwe_ids": [], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2023-11-07T23:44:25Z" }