-
Notifications
You must be signed in to change notification settings - Fork 15
Open
Labels
bugSomething isn't workingSomething isn't working
Description
Bug description
The project uses custom forks of critical security libraries from an unverified branch (mkmks/k256) instead of official releases. This poses a significant security risk as these libraries handle TLS/SSL encryption and certificate validation.
Affected Dependencies:
rustls- TLS libraryrcgen- Certificate generation libraryrustls-webpki- WebPKI certificate validationtokio-rustls- Async TLS wrapper
Location: Cargo.toml (root workspace)
[patch.crates-io]
rustls = { git = "https://github.com/rustls/rustls.git", branch = "mkmks/k256" }
rcgen = { git = "https://github.com/rustls/rcgen.git", branch = "mkmks/k256" }
rustls-webpki = { git = "https://github.com/rustls/rustls.git", branch = "mkmks/k256" }
tokio-rustls = { git = "https://github.com/rustls/rustls.git", branch = "mkmks/k256" }Severity: CRITICAL
To Reproduce
- Open
Cargo.tomlin the repository root - Review the
[patch.crates-io]section - Notice all TLS-related libraries are patched from an unofficial "mkmks/k256" branch
- These forks are not officially released versions and may contain unreviewed security changes
Expected behavior
The project should use:
- Official released versions from crates.io whenever possible
- If custom patches are required, they should be:
- From official maintainer branches
- Properly documented explaining why the fork is necessary
- Regularly updated to incorporate upstream security fixes
- Reviewed by security experts
Suggested Fix
- Immediate action: Document why these specific forks are required
- Short-term: Work with upstream maintainers to merge necessary changes into official releases
- Long-term: Migrate to official crates.io versions
- Security review: Have these forked dependencies audited for security issues
Additional Context
Using custom forks of security-critical cryptographic libraries significantly increases the attack surface and makes it difficult to receive security updates. This is especially concerning for a Key Management System that must maintain the highest security standards.
- Would you like to work on a fix? [y/n] Yes, happy to help document the rationale or assist in migration planning.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't working