Improper Verification of Cryptographic Signature Affecting rust package, versions <1.66.1-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.09% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE321-RUST-8485797
  • published6 Dec 2024
  • disclosed11 Jan 2023

Introduced: 11 Jan 2023

CVE-2022-46176  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade Alpine:3.21 rust to version 1.66.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rust package and not the rust package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [url.&lt;base&gt;.insteadOf][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS Scores

version 3.1