Debian Package Tracker
Register | Log in
Subscribe

rustc

Rust systems programming language

Choose email to subscribe with

general
  • source: rustc (main)
  • version: 1.70.0+dfsg1-1
  • maintainer: Debian Rust Maintainers (archive) (DMD)
  • uploaders: Fabian Grünbichler [DMD] [DM] – Ximin Luo [DMD] – Sylvestre Ledru [DMD]
  • arch: all any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.41.1+dfsg1-1~deb10u1
  • oldstable: 1.48.0+dfsg1-2
  • stable: 1.63.0+dfsg1-2
  • testing: 1.70.0+dfsg1-1
  • unstable: 1.70.0+dfsg1-1
versioned links
  • 1.34.2+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.41.1+dfsg1-1~deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.48.0+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.63.0+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.70.0+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libstd-rust-1.70
  • libstd-rust-dev
  • libstd-rust-dev-wasm32
  • libstd-rust-dev-windows
  • rust-all (1 bugs: 0, 1, 0, 0)
  • rust-clippy
  • rust-doc (5 bugs: 1, 2, 2, 0)
  • rust-gdb
  • rust-lldb (1 bugs: 1, 0, 0, 0)
  • rust-src (1 bugs: 0, 1, 0, 0)
  • rustc (12 bugs: 0, 10, 2, 0)
  • rustfmt
action needed
A new upstream version is available: 1.72.1 high
A new upstream version 1.72.1 is available, you should consider packaging it.
Created: 2022-10-04 Last update: 2023-09-29 09:36
2 bugs tagged help in the BTS normal
The BTS contains 2 bugs tagged help, please consider helping the maintainer in dealing with them.
Created: 2020-12-10 Last update: 2023-09-29 14:36
2 bugs tagged patch in the BTS normal
The BTS contains patches fixing 2 bugs (3 if counting merged bugs), consider including or untagging them.
Created: 2023-09-13 Last update: 2023-09-29 14:36
lintian reports 18 warnings normal
Lintian reports 18 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2023-09-21 Last update: 2023-09-21 11:36
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • rust-src could be marked Multi-Arch: foreign
Created: 2017-01-10 Last update: 2023-09-29 09:37
11 low-priority security issues in bullseye low

There are 11 open security issues in bullseye.

11 issues left for the package maintainer to handle:
  • CVE-2020-36317: (needs triaging) In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the same string.
  • CVE-2020-36318: (needs triaging) In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
  • CVE-2020-36323: (needs triaging) In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
  • CVE-2021-28875: (needs triaging) In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
  • CVE-2021-28876: (needs triaging) In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28877: (needs triaging) In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28878: (needs triaging) In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28879: (needs triaging) In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.
  • CVE-2021-29922: (needs triaging) library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
  • CVE-2021-31162: (needs triaging) In the standard library in Rust before 1.52.0, a double free can occur in the Vec::from_iter function if freeing the element panics.
  • CVE-2022-21658: (needs triaging) Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-07-04 Last update: 2023-09-26 06:59
debian/patches: 26 patches to forward upstream low

Among the 38 debian patches available in version 1.70.0+dfsg1-1 of the package, we noticed the following issues:

  • 26 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-09-21 06:13
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2023-09-21 Last update: 2023-09-21 06:00
news
[rss feed]
  • [2023-09-26] rustc 1.70.0+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-20] Accepted rustc 1.70.0+dfsg1-1 (source) into unstable (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-09-19] rustc 1.69.0+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-15] Accepted rustc 1.70.0+dfsg1-1~exp3 (source) into experimental (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-09-15] Accepted rustc 1.70.0+dfsg1-1~exp2 (source) into experimental (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-09-14] Accepted rustc 1.70.0+dfsg1-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Sylvestre Ledru)
  • [2023-09-13] Accepted rustc 1.69.0+dfsg1-1 (source) into unstable (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-09-13] Accepted rustc 1.69.0+dfsg1-1~exp2 (source) into experimental (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-09-12] Accepted rustc 1.69.0+dfsg1-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Sylvestre Ledru)
  • [2023-09-10] Accepted rustc 1.68.2+dfsg1-1 (source) into unstable (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-09-10] rustc 1.67.1+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-09] Accepted rustc 1.68.2+dfsg1-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Sylvestre Ledru)
  • [2023-09-04] Accepted rustc 1.67.1+dfsg1-1 (source) into unstable (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-08-05] Accepted rustc 1.67.1+dfsg1-1~exp1 (all amd64 source) into experimental (Debian FTP Masters) (signed by: James McCoy)
  • [2023-07-03] rustc 1.66.0+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-27] Accepted rustc 1.66.0+dfsg1-1 (source) into unstable (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-06-26] Accepted rustc 1.65.0+dfsg1-2 (source) into unstable (Jeremy Bícha) (signed by: Jeremy Bicha)
  • [2023-06-26] Accepted rustc 1.65.0+dfsg1-1 (source amd64 all) into unstable (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2023-06-19] Accepted rustc 1.64.0+dfsg1-1 (source amd64 all) into unstable (Debian FTP Masters) (signed by: Sylvestre Ledru)
  • [2023-04-28] Accepted rustc 1.66.0+dfsg1-1~exp1 (all amd64 source) into experimental (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2023-03-12] Accepted rustc 1.65.0+dfsg1-1~exp3 (source) into experimental (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-03-11] Accepted rustc 1.65.0+dfsg1-1~exp2 (source) into experimental (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2023-03-02] Accepted rustc 1.65.0+dfsg1-1~exp1 (amd64 all source) into experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • [2023-01-31] Accepted rustc 1.64.0+dfsg1-1~exp4 (source) into experimental (Fabian Gruenbichler)
  • [2023-01-25] rustc 1.63.0+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2023-01-20] Accepted rustc 1.64.0+dfsg1-1~exp3 (source) into experimental (Fabian Gruenbichler)
  • [2023-01-19] Accepted rustc 1.63.0+dfsg1-2 (source) into unstable (Fabian Gruenbichler)
  • [2023-01-11] Accepted rustc 1.64.0+dfsg1-1~exp2 (source) into experimental (Fabian Gruenbichler)
  • [2022-12-22] Accepted rustc 1.64.0+dfsg1-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Sylvestre Ledru)
  • [2022-12-13] rustc 1.63.0+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 27 28
  • RC: 2
  • I&N: 18 19
  • M&W: 7
  • F&P: 0
  • patch: 2 3
  • help: 2
links
  • homepage
  • lintian (0, 18)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.71.1+dfsg0ubuntu1-0ubuntu2
  • 8 bugs
  • patches for 1.71.1+dfsg0ubuntu1-0ubuntu2

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing