CVE-2023-38497
Rust vulnerability analysis and mitigation

Overview

CVE-2023-38497 affects Cargo, the package manager for the Rust programming language, in versions prior to 0.72.2 (bundled with Rust prior to version 1.71.1). The vulnerability was discovered and disclosed on August 3, 2023. The issue affects UNIX-like systems (like macOS and Linux) where Cargo failed to respect the umask when extracting crate archives (Rust Blog, GitHub Advisory).

Technical details

The vulnerability stems from Cargo not respecting the system's umask settings when extracting crate archives. In UNIX-like systems, each file has three sets of permissions: for the user owning the file, for the group owning the file, and for all other local users. The umask is configured to limit those permissions during file creation, removing dangerous ones. When Cargo downloads a dependency, it extracts the source code to disk for compilation, but it propagated the permissions stored in the crate archive as-is, bypassing the system's umask protection (GitHub Advisory).

Impact

If a user downloaded a crate containing files writeable by any local user, another local user could exploit this vulnerability to modify the source code that would be compiled and executed by the current user. This could potentially lead to code execution with the privileges of the user compiling the code (NVD).

Mitigation and workarounds

The primary mitigation is to update to Rust version 1.71.1 or later, which includes Cargo 0.72.2 that fixes the vulnerability. The fixed version respects the umask when extracting crate archives and will automatically purge caches generated by older versions. For users unable to update, a workaround is to prevent other local users from accessing the Cargo directory using the command: chmod go= ~/.cargo (GitHub Advisory).

Community reactions

The vulnerability was responsibly disclosed by Addison Crump according to the Rust security policy. The Rust Security Response WG coordinated the disclosure, with Weihang Lo developing the fix and Eric Huss reviewing it. Major Linux distributions like Fedora quickly released security updates to address the vulnerability (Fedora Update).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65807HIGH8.4
  • RustRust
  • sd
NoNoDec 10, 2025
CVE-2025-66627HIGH7.8
  • RustRust
  • typst
NoYesDec 09, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management