Affecting versions did not compare tokens in constant time, which could make it possible for an attacker to guess the 2fa token of a user.
This has been fixed by using using the crate constanttimeeq for comparison.
{ "license": "CC0-1.0" }
{ "affects": { "functions": [ "totp_rs::TOTP::check" ], "os": [], "arch": [] }, "affected_functions": null }
"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N"
null
"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2022-0018.json"
[ "crypto-failure" ]