Aws Sigv4 Amazon Aws Sigv4

Do you want an email whenever new security vulnerabilities are reported in Amazon Aws Sigv4?

By the Year

In 2024 there have been 0 vulnerabilities in Amazon Aws Sigv4 . Last year Aws Sigv4 had 1 security vulnerability published. Right now, Aws Sigv4 is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 5.50
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Aws Sigv4 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Amazon Aws Sigv4 Security Vulnerabilities

aws-sigv4 is a rust library for low level request signing in the aws cloud platform

CVE-2023-30610 5.5 - Medium - April 19, 2023

aws-sigv4 is a rust library for low level request signing in the aws cloud platform. The `aws_sigv4::SigningParams` struct had a derived `Debug` implementation. When debug-formatted, it would include a user's AWS access key, AWS secret key, and security token in plaintext. When TRACE-level logging is enabled for an SDK, `SigningParams` is printed, thereby revealing those credentials to anyone with access to logs. All users of the AWS SDK for Rust who enabled TRACE-level logging, either globally (e.g. `RUST_LOG=trace`), or for the `aws-sigv4` crate specifically are affected. This issue has been addressed in a set of new releases. Users are advised to upgrade. Users unable to upgrade should disable TRACE-level logging for AWS Rust SDK crates.

Insertion of Sensitive Information into Log File

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Amazon Aws Sigv4 or by Amazon? Click the Watch button to subscribe.

Amazon
Vendor

subscribe