-
Notifications
You must be signed in to change notification settings - Fork 13.4k
Issues: rust-lang/rust
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Vetting 3rd party crates for supply-chain-security issues
A-security
Area: Security (example: address space layout randomization).
C-enhancement
Category: An issue proposing an enhancement or a PR with one.
T-bootstrap
Relevant to the bootstrap subteam: Rust's build system (x.py and src/bootstrap)
T-infra
Relevant to the infrastructure team, which will review and decide on the PR/issue.
#128047
opened Jul 22, 2024 by
kornelski
Dynamic linking suppresses stackeroverflow detection
A-linkage
Area: linking into static, shared libraries and binaries
A-runtime
Area: std's runtime and "pre-main" init for handling backtraces, unwinds, stack overflows
A-security
Area: Security (example: address space layout randomization).
C-bug
Category: This is a bug.
T-libs
Relevant to the library team, which will review and decide on the PR/issue.
#110810
opened Apr 25, 2023 by
Eliah-Lakhin
Consider disabling LVI mitigations in the x86_64-fortanix-unknown-sgx target
A-security
Area: Security (example: address space layout randomization).
A-target-feature
Area: Enabling/disabling target features like AVX, Neon, etc.
A-target-specs
Area: Compile-target specifications
O-SGX
Target: SGX
O-x86_64
Target: x86-64 processors (like x86_64-*) (also known as amd64 and x64)
T-compiler
Relevant to the compiler team, which will review and decide on the PR/issue.
#108414
opened Feb 23, 2023 by
clauverjat
std::env
uses getenv
instead of secure_getenv
A-process
#92558
opened Jan 4, 2022 by
briansmith
-Ccontrol-flow-guard
should raise an error on unsupported platforms
A-security
#91060
opened Nov 19, 2021 by
nagisa
Method resolution can be influenced in unexpected ways by external crates.
A-security
Area: Security (example: address space layout randomization).
A-trait-system
Area: Trait system
C-bug
Category: This is a bug.
T-compiler
Relevant to the compiler team, which will review and decide on the PR/issue.
T-lang
Relevant to the language team
#90907
opened Nov 14, 2021 by
steffahn
Insecure behavior in std::process::Command on Windows
A-process
Area: `std::process` and `std::env`
A-security
Area: Security (example: address space layout randomization).
C-bug
Category: This is a bug.
O-windows
Operating system: Windows
P-high
High priority
T-libs
Relevant to the library team, which will review and decide on the PR/issue.
#87945
opened Aug 11, 2021 by
bk2204
Exploit mitigations applied by default are not documented
A-docs
Area: Documentation for any part of the project, including the compiler, standard library, and tools
A-security
Area: Security (example: address space layout randomization).
C-enhancement
Category: An issue proposing an enhancement or a PR with one.
PG-exploit-mitigations
Project group: Exploit mitigations
T-compiler
Relevant to the compiler team, which will review and decide on the PR/issue.
#71098
opened Apr 13, 2020 by
Shnatsel
Restrict Windows DLL search path as a precaution against DLL pre-loading attacks
A-security
Area: Security (example: address space layout randomization).
C-enhancement
Category: An issue proposing an enhancement or a PR with one.
O-windows
Operating system: Windows
#56056
opened Nov 19, 2018 by
cpeterso
Enable strict HANDLE checking for all Windows Rust programs
A-runtime
Area: std's runtime and "pre-main" init for handling backtraces, unwinds, stack overflows
A-security
Area: Security (example: address space layout randomization).
C-enhancement
Category: An issue proposing an enhancement or a PR with one.
O-windows
Operating system: Windows
T-libs-api
Relevant to the library API team, which will review and decide on the PR/issue.
#56055
opened Nov 19, 2018 by
cpeterso
MinGW's linker does not create a reloc section for DYNAMICBASE executables
A-linkage
Area: linking into static, shared libraries and binaries
A-security
Area: Security (example: address space layout randomization).
C-bug
Category: This is a bug.
O-windows-gnu
Toolchain: GNU, Operating system: Windows
#16581
opened Aug 18, 2014 by
thestinger
ProTip!
Type g p on any issue or pull request to go back to the pull request listing page.