Skip to content

Commit 076de20

Browse files
Merge pull request #1060 from pietroalbini/pa-cve-update
Mention additional mitigation for CVE-2022-46176
2 parents 066dedb + f9beba6 commit 076de20

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

posts/2023-01-10-cve-2022-46176.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,17 @@ message detailing how to add that public key to the list of trusted keys. Note
5252
that this might break your automated builds if the hosts you clone dependencies
5353
or indexes from are not already trusted.
5454

55+
If you can't upgrade to Rust 1.66.1 yet, we recommend configuring Cargo to use
56+
the `git` CLI instead of its built-in git support. That way, all git network
57+
operations will be performed by the `git` CLI, which is not affected by this
58+
vulnerability. You can do so by adding this snippet to your [Cargo
59+
configuration file](https://doc.rust-lang.org/cargo/reference/config.html):
60+
61+
```toml
62+
[net]
63+
git-fetch-with-cli = true
64+
```
65+
5566
## Acknowledgments
5667

5768
Thanks to the Julia Security Team for disclosing this to us according to our
@@ -63,6 +74,8 @@ patch, Pietro Albini for coordinating the disclosure and writing this advisory,
6374
and Josh Stone, Josh Triplett and Jacob Finkelman for advising during the
6475
disclosure.
6576

77+
*Updated on 2023-01-10 at 21:30 UTC to include additional mitigations.*
78+
6679
[1]: https://git-scm.com/docs/git-config#Documentation/git-config.txt-urlltbasegtinsteadOf
6780
[2]: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176
6881
[3]: https://www.rust-lang.org/policies/security

0 commit comments

Comments
 (0)