Affecting versions did not compare tokens in constant time, which could make it possible for an attacker to guess the 2fa token of a user.
This has been fixed by using using the crate constanttimeeq for comparison.
{ "license": "CC0-1.0" }
{ "affects": { "os": [], "arch": [], "functions": [ "totp_rs::TOTP::check" ] }, "affected_functions": null }
[ "crypto-failure" ]
"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N"
null