Skip to content

Issues: rust-lang/rust

Draft release notes for 1.88.0
#141598 opened May 26, 2025 by Mark-Simulacrum
Open 10
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Author
Filter by author
Loading
Label
Filter by label
Loading
Use alt + click/return to exclude labels
or + click/return for logical OR
Projects
Filter by project
Loading
Milestones
Filter by milestone
Loading
Assignee
Filter by who’s assigned
Assigned to nobody Loading
Sort

Issues list

Vetting 3rd party crates for supply-chain-security issues A-security Area: Security (example: address space layout randomization). C-enhancement Category: An issue proposing an enhancement or a PR with one. T-bootstrap Relevant to the bootstrap subteam: Rust's build system (x.py and src/bootstrap) T-infra Relevant to the infrastructure team, which will review and decide on the PR/issue.
#128047 opened Jul 22, 2024 by kornelski
Dynamic linking suppresses stackeroverflow detection A-linkage Area: linking into static, shared libraries and binaries A-runtime Area: std's runtime and "pre-main" init for handling backtraces, unwinds, stack overflows A-security Area: Security (example: address space layout randomization). C-bug Category: This is a bug. T-libs Relevant to the library team, which will review and decide on the PR/issue.
#110810 opened Apr 25, 2023 by Eliah-Lakhin
Consider disabling LVI mitigations in the x86_64-fortanix-unknown-sgx target A-security Area: Security (example: address space layout randomization). A-target-feature Area: Enabling/disabling target features like AVX, Neon, etc. A-target-specs Area: Compile-target specifications O-SGX Target: SGX O-x86_64 Target: x86-64 processors (like x86_64-*) (also known as amd64 and x64) T-compiler Relevant to the compiler team, which will review and decide on the PR/issue.
#108414 opened Feb 23, 2023 by clauverjat
std::env uses getenv instead of secure_getenv A-process Area: `std::process` and `std::env` A-security Area: Security (example: address space layout randomization). C-bug Category: This is a bug. T-libs Relevant to the library team, which will review and decide on the PR/issue.
#92558 opened Jan 4, 2022 by briansmith
-Ccontrol-flow-guard should raise an error on unsupported platforms A-security Area: Security (example: address space layout randomization). C-bug Category: This is a bug. T-compiler Relevant to the compiler team, which will review and decide on the PR/issue.
#91060 opened Nov 19, 2021 by nagisa
Method resolution can be influenced in unexpected ways by external crates. A-security Area: Security (example: address space layout randomization). A-trait-system Area: Trait system C-bug Category: This is a bug. T-compiler Relevant to the compiler team, which will review and decide on the PR/issue. T-lang Relevant to the language team
#90907 opened Nov 14, 2021 by steffahn
Insecure behavior in std::process::Command on Windows A-process Area: `std::process` and `std::env` A-security Area: Security (example: address space layout randomization). C-bug Category: This is a bug. O-windows Operating system: Windows P-high High priority T-libs Relevant to the library team, which will review and decide on the PR/issue.
#87945 opened Aug 11, 2021 by bk2204
Exploit mitigations applied by default are not documented A-docs Area: Documentation for any part of the project, including the compiler, standard library, and tools A-security Area: Security (example: address space layout randomization). C-enhancement Category: An issue proposing an enhancement or a PR with one. PG-exploit-mitigations Project group: Exploit mitigations T-compiler Relevant to the compiler team, which will review and decide on the PR/issue.
#71098 opened Apr 13, 2020 by Shnatsel
Restrict Windows DLL search path as a precaution against DLL pre-loading attacks A-security Area: Security (example: address space layout randomization). C-enhancement Category: An issue proposing an enhancement or a PR with one. O-windows Operating system: Windows
#56056 opened Nov 19, 2018 by cpeterso
Enable strict HANDLE checking for all Windows Rust programs A-runtime Area: std's runtime and "pre-main" init for handling backtraces, unwinds, stack overflows A-security Area: Security (example: address space layout randomization). C-enhancement Category: An issue proposing an enhancement or a PR with one. O-windows Operating system: Windows T-libs-api Relevant to the library API team, which will review and decide on the PR/issue.
#56055 opened Nov 19, 2018 by cpeterso
MinGW's linker does not create a reloc section for DYNAMICBASE executables A-linkage Area: linking into static, shared libraries and binaries A-security Area: Security (example: address space layout randomization). C-bug Category: This is a bug. O-windows-gnu Toolchain: GNU, Operating system: Windows
#16581 opened Aug 18, 2014 by thestinger
ProTip! Type g p on any issue or pull request to go back to the pull request listing page.