RUSTSEC-2023-0003

Source
https://rustsec.org/advisories/RUSTSEC-2023-0003
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2023-0003.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2023-0003
Aliases
Published
2023-01-20T12:00:00Z
Modified
2023-11-08T04:11:38.429673Z
Summary
git2 does not verify SSH keys by default
Details

The git2 and libgit2-sys crates are Rust wrappers around the libgit2 C library. It was discovered that libgit2 1.5.0 and below did not verify SSH host keys when establishing an SSH connection, exposing users of the library to Man-In-the-Middle attacks.

The libgit2 team assigned CVE-2023-22742 to this vulnerability. The following versions of the libgit2-sys Rust crate have been released:

  • libgit2-sys 0.14.2, updating the underlying libgit2 C library to version 1.5.1.
  • libgit2-sys 0.13.5, updating the underlying libgit2 C library to version 1.4.5.

A new git2 crate version has also been released, 0.16.1. This version only bumps its libgit2-sys dependency to ensure no vulnerable libgit2-sys versions are used, but contains no code changes: if you update the libgit2-sys version there is no need to also update the git2 crate version.

You can learn more about this vulnerability in libgit2's advisory

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / libgit2-sys

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.13.5
Introduced
0.14.0
Fixed
0.14.2

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": [
        "crypto-failure"
    ]
}