You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2.6 KiB
2.6 KiB
TRACK-2025-11-09: Remediate transitive rsa and paste advisories
Status: Open Owner: @maintainers (please assign) Created: 2025-11-09
Summary
This tracking issue records the planned remediation work for two transitive advisories found during the local audit on 2025-11-09:
- RUSTSEC-2023-0071 —
rsa = 0.9.8(Marvin Attack). No safe published upgrade was available at audit time. Transitive path:openidconnect->...->rsa. - RUSTSEC-2024-0436 —
paste = 1.0.15(unmaintained). Transitive path:rmp/rmpv->paste.
Goals
- Remove or replace the transitive dependency on
rsaso the project does not depend on the vulnerable crate. - Replace or remove
pasteusage by migrating to a maintained alternative (e.g.,pastey) or removing the transitive dependency chain. - Remove the temporary exceptions from
deny.tomlonce remediation is complete.
Plan
-
Repro steps
- Run
cargo tree -i rsaandcargo tree -i pasteto show the reverse dependency chain and confirm the top-level crate(s) importing them.
- Run
-
Investigate fixes
-
For
rsa: identify whetheropenidconnector another dependency directly pullsrsa. Check if newer published versions of the top-level crate avoidrsa. -
If no published version removes
rsa, assess vendor or patch options:- Replace
openidconnectwith an alternative OIDC client that avoidsrsa(e.g., a crate using ring/openssl for crypto), or - Submit a PR to upstream crates to adopt a constant-time implementation, or
- Vendor a small shim that provides the needed functionality using a vetted crypto library.
- Replace
-
For
paste: check ifrmp/rmpvcan be upgraded to eliminatepasteor if a maintained fork (e.g.,pastey) can be used.
-
-
Tests and validation
- Add unit/integration tests for the replaced functionality (auth flows, message formats) to ensure behavior parity.
- Re-run audit tooling in CI and verify
cargo-denyno longer reports the advisories.
-
Timeline and owner
- Target ETA: 2026-02-01 (three months). Adjust based on investigation findings.
- Owner: @maintainers or assign a specific engineer.
-
Rollback/compensating controls
- If remediation requires longer work, consider adding hardened monitoring, limiting feature usage, or using runtime mitigations where possible.
Links
- Audit note: SECURITY-AUDIT-2025-11-09.md
- PR branch: remediations/audit-2025-11-09
Next steps
- Assign an owner, run
cargo tree -i rsaandcargo tree -i paste, and update this issue with findings and the chosen remediation path.