-
Notifications
You must be signed in to change notification settings - Fork 139
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shall standard library vulnerabilities also be in scope of cargo-audit? #46
Comments
We had a discussion about this on the Security WG kickoff call a few days ago. Some tentative takeaways were that:
|
There's a tentative plan to do this. I can propose a rough outline of what I'd have in mind for it:
After that, we'd need to find (or create) an authoritative list of all previous vulnerabilities in |
Quick skim of previously identified security issues in rust-core; only two of them are in
|
Okay so that's:
Not sure what to do about Rust 1.13 regarding a canonical identifier... I guess we could list all of the relevant vulns for those |
CVE-2018-1000622 for the rustdoc one. I don't believe there's one for the cargo change (it's also not really notable IMO). |
I've thought about this for a while, and here's a bunch of things we could do about std or compiler vulnerabilities:
I see (1) as more of a job for I'm not sure whether (3) is useful in any way. There's not much the crate maintainer can do about that. Well, he can add a minimum required version to the crate, but it's a waste of time to do that manually and may refuse to build for no reason on compilers with backported security fixes. |
For a start, I'd like to get them catalogued somewhere, and write APIs to access them from the The itch I'd ultimately like to scratch for myself is being able to identify historical builds (e.g. container images) containing artifacts built with vulnerable versions of the compiler/std. That said, I think it's fine for |
I'm now even more interested in cataloguing these because it turns out that rustc already encodes its version in all executables it compiles. Try |
Just to bump to the original question!: Personally I think std should be in the scope of cargo audit as well. Since 'std' is a reserved crate name I wonder what would be against us putting it along side other crates as well? Maybe we could change RUSTSEC- to CVE-, but I don't think using RUSTSEC-* for std would be bad as well, since it is basically just like any other crate aside some special compiler integration maybe. Not differentiating too much from other crates will probably make future APIs easier to use. But I might be wrong about all this though! However if we feel like they are not in the scope of cargo-audit we should probably close this issue. |
Files vulnerabilities in the standard library originally reported at: https://groups.google.com/forum/#!forum/rustlang-security-announcements Or otherwise collected at: rustsec/rustsec#46 The `rustsec` crate doesn't presently consume these, but I'd like to add support ASAP.
Files vulnerabilities in the standard library originally reported at: https://groups.google.com/forum/#!forum/rustlang-security-announcements Or otherwise collected at: rustsec/rustsec#46 The `rustsec` crate doesn't presently consume these, but I'd like to add support ASAP.
File standard libary/core vulns (closes rustsec/rustsec#46)
The known |
README.md: Move "Documentation" link up
Example: https://www.reddit.com/r/rust/comments/9hssab/security_announcement_for_strrepeat/
The text was updated successfully, but these errors were encountered: