Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Marvin Attack: potential key recovery through timing sidechannels #457

Closed
HZzz2 opened this issue Nov 1, 2024 · 1 comment
Closed

Marvin Attack: potential key recovery through timing sidechannels #457

HZzz2 opened this issue Nov 1, 2024 · 1 comment

Comments

@HZzz2
Copy link

HZzz2 commented Nov 1, 2024

image

Run cargo audit
Fetching advisory database from https://github.com/RustSec/advisory-db.git
Loaded 664 security advisories (from /home/runner/.cargo/advisory-db)
Updating crates.io index
Scanning Cargo.lock for vulnerabilities (315 crate dependencies)
error: 1 vulnerability found!
Crate: rsa
Version: 0.9.6
Title: Marvin Attack: potential key recovery through timing sidechannels
Date: 2023-11-22
ID: RUSTSEC-2023-0071
URL: https://rustsec.org/advisories/RUSTSEC-2023-0071
Severity: 5.9 (medium)
Solution: No fixed upgrade is available!
Dependency tree:
rsa 0.9.6
├── ssh-key 0.6.7
│ ├── russh-keys 0.45.0
│ │ ├── russh 0.45.0
│ │ │ └── async-ssh2-tokio 0.8.12
│ │ │ └── tgbot-app 0.2.13
│ │ └── async-ssh2-tokio 0.8.12
│ └── russh 0.45.0
└── russh-keys 0.45.0

Error: Process completed with exit code 1.

@tarcieri
Copy link
Member

tarcieri commented Nov 1, 2024

Dup of #19

@tarcieri tarcieri closed this as not planned Won't fix, can't repro, duplicate, stale Nov 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants