Skip to content

RUSTSEC-2023-0071 (track): rsa crate Marvin Attack — remove audit ignore when fix is available #1

@sarroutbi

Description

@sarroutbi

Context

cargo audit reports RUSTSEC-2023-0071 (Marvin Attack: potential key recovery through timing sidechannels) against the rsa 0.9.10
transitive dependency.

The advisory is currently accepted in .cargo/audit.toml because:

  1. The vulnerable codepath is PKCS#1 v1.5 decryption. This project does not perform RSA decryption.
  2. rsa enters the dependency tree only via openidconnect 4.x, which uses it for JWT signature verification — not affected by the Marvin Attack.
  3. No fixed rsa version exists upstream (as of 2026-04-09).

Current dependency path

rsa 0.9.10
└── openidconnect 4.0.1
└── keylime-webtool-backend 0.1.0

Action required when a fix is available

When a patched rsa crate is published:

  1. Update openidconnect (or its transitive chain) to pull in the fixed rsa version
  2. Remove RUSTSEC-2023-0071 from .cargo/audit.toml
  3. Verify cargo audit passes clean without the ignore

How to monitor

  • Watch RUSTSEC-2023-0071 for a patched_versions update
  • Watch RustCrypto/RSA for a constant-time implementation release
  • Periodically run cargo audit --ignore RUSTSEC-2023-0071 to check for any new advisories

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions