Skip to content

Commit 629ccbe

Browse files
committed
resloved RUSTSEC-2023-0071
Signed-off-by: Marcel Guzik <marcel.guzik@cumulocity.com>
1 parent a547b57 commit 629ccbe

File tree

2 files changed

+52
-0
lines changed

2 files changed

+52
-0
lines changed

.cargo/audit.toml

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
# https://github.com/rustsec/rustsec/blob/main/cargo-audit/audit.toml.example
2+
#
3+
# Example audit config file
4+
#
5+
# It may be located in the user home (`~/.cargo/audit.toml`) or in the project
6+
# root (`.cargo/audit.toml`).
7+
#
8+
# All of the options which can be passed via CLI arguments can also be
9+
# permanently specified in this file.
10+
11+
[advisories]
12+
# advisory IDs to ignore e.g. ["RUSTSEC-2019-0001", ...]
13+
ignore = [
14+
# The vulnerability regards attacker's ability to recover parts of the private key by observing
15+
# the timings of the decryption operation. We only use the crate to construct the public key
16+
# from components, so this doesn't affect us. To make sure we don't use affected API,
17+
# appropriate entries should be added to clippy.toml to disallow these methods.
18+
"RUSTSEC-2023-0071"
19+
]
20+
informational_warnings = ["unmaintained"] # warn for categories of informational advisories
21+
severity_threshold = "low" # CVSS severity ("none", "low", "medium", "high", "critical")
22+
23+
# Advisory Database Configuration
24+
# [database]
25+
# path = "~/.cargo/advisory-db" # Path where advisory git repo will be cloned
26+
# url = "https://github.com/RustSec/advisory-db.git" # URL to git repo
27+
# fetch = true # Perform a `git fetch` before auditing (default: true)
28+
# stale = false # Allow stale advisory DB (i.e. no commits for 90 days, default: false)
29+
30+
# Output Configuration
31+
# [output]
32+
# deny = ["unmaintained"] # exit on error if unmaintained dependencies are found
33+
# format = "terminal" # "terminal" (human readable report) or "json"
34+
# quiet = false # Only print information on error
35+
# show_tree = true # Show inverse dependency trees along with advisories (default: true)
36+
37+
# Target Configuration
38+
# [target]
39+
# arch = ["x86_64"] # Ignore advisories for CPU architectures other than these
40+
# os = ["linux", "windows"] # Ignore advisories for operating systems other than these
41+
42+
[yanked]
43+
enabled = true # Warn for yanked crates in Cargo.lock (default: true)
44+
update_index = true # Auto-update the crates.io index (default: true)

clippy.toml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,17 @@
11
disallowed-types = [
22
{ path = "reqwest::ClientBuilder", reason = "Use `certificate::CloudRootCerts` type instead to take root_cert_path configurations into account" },
3+
4+
# advisory resolved by forbidding these methods and types; see audit.toml
5+
{path = "rsa::traits::Decryptor", reason="RUSTSEC-2023-0071"},
6+
{path = "rsa::RsaPrivateKey", reason="RUSTSEC-2023-0071"},
7+
{path = "rsa::pkcs1v15::DecryptingKey", reason="RUSTSEC-2023-0071"},
8+
{path = "rsa::oaep::Oaep", reason="RUSTSEC-2023-0071"},
9+
{path = "rsa::oaep::DecryptingKey", reason="RUSTSEC-2023-0071"},
310
]
411
disallowed-methods = [
512
{ path = "reqwest::Client::builder", reason = "Use `certificate::CloudRootCerts` type instead to take root_cert_path configurations into account" },
613
{ path = "reqwest::Client::new", reason = "Use `certificate::CloudRootCerts` type instead to take root_cert_path configurations into account" },
714
{ path = "hyper_rustls::HttpsConnectorBuilder::with_native_roots", reason = "Use .with_tls_config(tedge_config.cloud_client_tls_config()) instead to use configured root certificate paths for the connected cloud" },
15+
{path = "rsa::RsaPrivateKey::decrypt"},
816
]
917
large-error-threshold = 256

0 commit comments

Comments
 (0)