Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.
Sign upShall standard library vulnerabilities also be in scope of cargo-audit? #46
Comments
This comment has been minimized.
This comment has been minimized.
|
We had a discussion about this on the Security WG kickoff call a few days ago. Some tentative takeaways were that:
|
This comment has been minimized.
This comment has been minimized.
|
There's a tentative plan to do this. I can propose a rough outline of what I'd have in mind for it:
After that, we'd need to find (or create) an authoritative list of all previous vulnerabilities in |
This comment has been minimized.
This comment has been minimized.
|
Quick skim of previously identified security issues in rust-core; only two of them are in
|
This comment has been minimized.
This comment has been minimized.
|
Okay so that's:
Not sure what to do about Rust 1.13 regarding a canonical identifier... I guess we could list all of the relevant vulns for those |
This comment has been minimized.
This comment has been minimized.
|
CVE-2018-1000622 for the rustdoc one. I don't believe there's one for the cargo change (it's also not really notable IMO). |
This comment has been minimized.
This comment has been minimized.
Shnatsel
commented
Oct 15, 2018
|
I've thought about this for a while, and here's a bunch of things we could do about std or compiler vulnerabilities:
I see (1) as more of a job for I'm not sure whether (3) is useful in any way. There's not much the crate maintainer can do about that. Well, he can add a minimum required version to the crate, but it's a waste of time to do that manually and may refuse to build for no reason on compilers with backported security fixes. |
This comment has been minimized.
This comment has been minimized.
|
For a start, I'd like to get them catalogued somewhere, and write APIs to access them from the The itch I'd ultimately like to scratch for myself is being able to identify historical builds (e.g. container images) containing artifacts built with vulnerable versions of the compiler/std. That said, I think it's fine for |
This comment has been minimized.
This comment has been minimized.
Shnatsel
commented
Jan 12, 2019
|
I'm now even more interested in cataloguing these because it turns out that rustc already encodes its version in all executables it compiles. Try |
This comment has been minimized.
This comment has been minimized.
DevQps
commented
Mar 16, 2019
•
|
Just to bump to the original question!: Personally I think std should be in the scope of cargo audit as well. Since 'std' is a reserved crate name I wonder what would be against us putting it along side other crates as well? Maybe we could change RUSTSEC- to CVE-, but I don't think using RUSTSEC-* for std would be bad as well, since it is basically just like any other crate aside some special compiler integration maybe. Not differentiating too much from other crates will probably make future APIs easier to use. But I might be wrong about all this though! However if we feel like they are not in the scope of cargo-audit we should probably close this issue. |
vi commentedSep 25, 2018
Example: https://www.reddit.com/r/rust/comments/9hssab/security_announcement_for_strrepeat/