Improper Verification of Cryptographic Signature Affecting rust-debuginfo package, versions <0:1.66.1-1.amzn2023.0.3


Severity

Recommended
0.0
medium
0
10

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.09% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2023-RUSTDEBUGINFO-3350405
  • published7 Mar 2023
  • disclosed11 Jan 2023

Introduced: 11 Jan 2023

CVE-2022-46176  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 rust-debuginfo to version 0:1.66.1-1.amzn2023.0.3 or higher.
This issue was patched in ALAS2023-2023-109.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rust-debuginfo package and not the rust-debuginfo package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [url.&lt;base&gt;.insteadOf][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS Scores

version 3.1