Skip to content

Add Errors, Types, and Trait definitions for Explorer API #54

Add Errors, Types, and Trait definitions for Explorer API

Add Errors, Types, and Trait definitions for Explorer API #54

GitHub Actions / Security audit failed Mar 15, 2024 in 0s

Security advisories found

1 advisory(ies), 5 unmaintained

Details

Vulnerabilities

RUSTSEC-2023-0071

Marvin Attack: potential key recovery through timing sidechannels

Details
Package rsa
Version 0.9.6
URL RustCrypto/RSA#19 (comment)
Date 2023-11-22

Impact

Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key.

Patches

No patch is yet available, however work is underway to migrate to a fully constant-time implementation.

Workarounds

The only currently available workaround is to avoid using the rsa crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer is fine.

References

This vulnerability was discovered as part of the "Marvin Attack", which revealed several implementations of RSA including OpenSSL had not properly mitigated timing sidechannel attacks.

Warnings

RUSTSEC-2021-0060

aes-soft has been merged into the aes crate

Details
Status unmaintained
Package aes-soft
Version 0.6.4
URL RustCrypto/block-ciphers#200
Date 2021-04-29

Please use the aes crate going forward. The new repository location is at:

<https://github.com/RustCrypto/block-ciphers/tree/master/aes>

AES-NI is now autodetected at runtime on i686/x86-64 platforms.
If AES-NI is not present, the aes crate will fallback to a constant-time
portable software implementation.

To force the use of a constant-time portable implementation on these platforms,
even if AES-NI is available, use the new force-soft feature of the aes
crate to disable autodetection.

RUSTSEC-2021-0059

aesni has been merged into the aes crate

Details
Status unmaintained
Package aesni
Version 0.10.0
URL RustCrypto/block-ciphers#200
Date 2021-04-29

Please use the aes crate going forward. The new repository location is at:

<https://github.com/RustCrypto/block-ciphers/tree/master/aes>

AES-NI is now autodetected at runtime on i686/x86-64 platforms.
If AES-NI is not present, the aes crate will fallback to a constant-time
portable software implementation.

To prevent this fallback (and have absence of AES-NI result in an illegal
instruction crash instead), continue to pass the same RUSTFLAGS which were
previously required for the aesni crate to compile:

RUSTFLAGS=-Ctarget-feature=+aes,+ssse3

RUSTSEC-2021-0064

cpuid-bool has been renamed to cpufeatures

Details
Status unmaintained
Package cpuid-bool
Version 0.2.0
URL RustCrypto/utils#381
Date 2021-05-06

Please use the `cpufeatures`` crate going forward:

<https://github.com/RustCrypto/utils/tree/master/cpufeatures>

There will be no further releases of cpuid-bool.

RUSTSEC-2022-0044

markdown (1.0.0 and higher) is maintained

Details
Status unmaintained
Package markdown
Version 0.3.0
URL johannhof/markdown.rs#48
Date 2022-01-17

A new markdown crate has been brought over by a new maintainer replacing the old crate.

As of time of writing only pre-releases seem to be available for the 1.0.0 version of the crate.

The crate GitHub repository is now wooorm/markdown-rs

markdown (0.3.0 and lower) was unmaintained

The old markdown crate was no longer actively maintained.

The crate GitHub repository was johannhof/markdown.rs

RUSTSEC-2020-0056

stdweb is unmaintained

Details
Status unmaintained
Package stdweb
Version 0.4.20
URL koute/stdweb#403
Date 2020-05-04

The author of the stdweb crate is unresponsive.

Maintained alternatives: