by alex14fr on 1/21/22, 2:06 PM with 41 comments
by nindalf on 1/21/22, 2:45 PM
Do people know the state in other languages?
by cyber_kinetist on 1/21/22, 3:40 PM
Here's an RFC that tries to extend lifetimes to file handles: https://github.com/rust-lang/rfcs/blob/master/text/3128-io-s...
by josephcsible on 1/21/22, 2:25 PM
by vlmutolo on 1/22/22, 1:01 AM
> - macOS before version 10.10 (Yosemite)
> - REDOX
It's funny to me that they chose to include RedoxOS in this security advisory. For those of you serving your customers over RedoxOS in production, beware.
by vessenes on 1/21/22, 3:56 PM
The vulnerability mentions a userspace compromise aimed at a system directory, not another sensitive user directory.
In my mind, a user trying to delete say /usr/bin on a POSIX system is going to be slapped down immediately unless they are root, or have the proper group access, and this is not the responsibility of any standard library, it’s the responsibility of the fs layer and kernel.
So, what am I misunderstanding? Opening up a link to /usr/bin doesn’t ever give me permissions on /usr/bin over what I have.
by perlgeek on 1/21/22, 4:11 PM
Does that mean that any Rust program compiled with any affected version of the standard library is affected? How would I even find those?
Statically linked binary make deployments really easy, but this one scenario where they have real downsides.
by crispyalmond on 1/21/22, 2:18 PM
by PeterCorless on 1/21/22, 4:15 PM
https://github.com/tokio-rs/tokio/blob/b42f21ec3e212ace25331...