Debian Package Tracker
Register | Log in
Subscribe

rustc

Rust systems programming language

Choose email to subscribe with

general
  • source: rustc (main)
  • version: 1.48.0+dfsg1-2
  • maintainer: Debian Rust Maintainers (archive) (DMD)
  • uploaders: Sylvestre Ledru [DMD] – Ximin Luo [DMD]
  • arch: all any
  • std-ver: 4.2.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1.34.2+dfsg1-1~deb9u1
  • old-sec: 1.41.1+dfsg1-1~deb9u1
  • stable: 1.41.1+dfsg1-1~deb10u1
  • testing: 1.48.0+dfsg1-2
  • unstable: 1.48.0+dfsg1-2
  • exp: 1.51.0+dfsg1-1~exp1
versioned links
  • 1.34.2+dfsg1-1~deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.34.2+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.41.1+dfsg1-1~deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.41.1+dfsg1-1~deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.48.0+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.50.0+dfsg1-1~exp4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.51.0+dfsg1-1~exp1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libstd-rust-1.48
  • libstd-rust-dev
  • libstd-rust-dev-wasm32
  • libstd-rust-dev-windows
  • rust-doc (4 bugs: 1, 2, 1, 0)
  • rust-gdb
  • rust-lldb (1 bugs: 1, 0, 0, 0)
  • rust-src (1 bugs: 0, 1, 0, 0)
  • rustc (11 bugs: 1, 9, 1, 0)
action needed
A new upstream version is available: 1.51.0 high
A new upstream version 1.51.0 is available, you should consider packaging it.
Created: 2021-03-02 Last update: 2021-04-23 08:02
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2020-12-23 Last update: 2021-04-23 04:05
lintian reports 4 errors and 21 warnings high
Lintian reports 4 errors and 21 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-09-21 Last update: 2021-04-23 01:07
9 security issues in stretch high

There are 9 open security issues in stretch.

9 important issues:
  • CVE-2020-36317: In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the same string.
  • CVE-2020-36318: In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
  • CVE-2020-36323: In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
  • CVE-2021-28875: In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
  • CVE-2021-28876: In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28877: In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28878: In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28879: In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.
  • CVE-2021-31162: In the standard library in Rust before 1.53.0, a double free can occur in the Vec::from_iter function if freeing the element panics.
Created: 2021-04-12 Last update: 2021-04-16 05:54
9 security issues in sid high

There are 9 open security issues in sid.

9 important issues:
  • CVE-2020-36317: In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the same string.
  • CVE-2020-36318: In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
  • CVE-2020-36323: In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
  • CVE-2021-28875: In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
  • CVE-2021-28876: In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28877: In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28878: In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28879: In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.
  • CVE-2021-31162: In the standard library in Rust before 1.53.0, a double free can occur in the Vec::from_iter function if freeing the element panics.
Created: 2021-04-12 Last update: 2021-04-16 05:54
9 security issues in buster high

There are 9 open security issues in buster.

9 important issues:
  • CVE-2020-36317: In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the same string.
  • CVE-2020-36318: In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
  • CVE-2020-36323: In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
  • CVE-2021-28875: In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
  • CVE-2021-28876: In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28877: In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28878: In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28879: In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.
  • CVE-2021-31162: In the standard library in Rust before 1.53.0, a double free can occur in the Vec::from_iter function if freeing the element panics.
Created: 2021-04-12 Last update: 2021-04-16 05:54
9 security issues in bullseye high

There are 9 open security issues in bullseye.

9 important issues:
  • CVE-2020-36317: In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the same string.
  • CVE-2020-36318: In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
  • CVE-2020-36323: In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
  • CVE-2021-28875: In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
  • CVE-2021-28876: In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28877: In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28878: In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
  • CVE-2021-28879: In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.
  • CVE-2021-31162: In the standard library in Rust before 1.53.0, a double free can occur in the Vec::from_iter function if freeing the element panics.
Created: 2021-04-12 Last update: 2021-04-16 05:54
2 bugs tagged help in the BTS normal
The BTS contains 2 bugs tagged help, please consider helping the maintainer in dealing with them.
Created: 2020-12-10 Last update: 2021-04-23 11:32
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2020-12-28 Last update: 2021-04-23 09:03
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • rust-src could be marked Multi-Arch: foreign
Created: 2017-01-10 Last update: 2021-04-23 08:35
Build log checks report 3 warnings low
Build log checks report 3 warnings
Created: 2020-12-21 Last update: 2020-12-21 04:05
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.5.1 instead of 4.2.1).
Created: 2018-12-23 Last update: 2020-12-20 23:35
news
[rss feed]
  • [2021-04-22] Accepted rustc 1.51.0+dfsg1-1~exp1 (armel source) into experimental, experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • [2021-04-12] Accepted rustc 1.50.0+dfsg1-1~exp4 (source) into experimental (Ximin Luo) (signed by: infinity0@debian.org)
  • [2021-04-11] Accepted rustc 1.50.0+dfsg1-1~exp3 (source) into experimental (Ximin Luo) (signed by: infinity0@debian.org)
  • [2021-04-10] Accepted rustc 1.50.0+dfsg1-1~exp2 (source) into experimental (Ximin Luo) (signed by: infinity0@debian.org)
  • [2021-04-09] Accepted rustc 1.50.0+dfsg1-1~exp1 (armel source) into experimental, experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • [2021-04-05] Accepted rustc 1.49.0+dfsg1-1~exp1 (source) into experimental (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-12-26] rustc 1.48.0+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2020-12-26] rustc 1.48.0+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2020-12-22] Accepted rustc 1.49.0~beta.4+dfsg1-1~exp1 (armhf source) into experimental, experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • [2020-12-20] Accepted rustc 1.48.0+dfsg1-2 (source) into unstable (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-12-07] rustc 1.48.0+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2020-12-01] Accepted rustc 1.48.0+dfsg1-1 (source) into unstable (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-12-01] Accepted rustc 1.48.0+dfsg1-1~exp1 (source) into unstable (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-11-17] rustc 1.47.0+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2020-11-17] rustc 1.47.0+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2020-11-13] Accepted rustc 1.48.0~beta.8+dfsg1-1~exp3 (source) into experimental (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-11-13] Accepted rustc 1.48.0~beta.8+dfsg1-1~exp2 (source) into experimental (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-11-11] Accepted rustc 1.48.0~beta.8+dfsg1-1~exp1 (armhf all source) into experimental, experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • [2020-11-07] Accepted rustc 1.47.0+dfsg1-1 (source) into unstable (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-09-17] Accepted rustc 1.41.1+dfsg1-1~deb9u1 (source amd64 all) into oldstable, oldstable (Debian FTP Masters) (signed by: Emilio Pozuelo Monfort)
  • [2020-09-14] Accepted rustc 1.41.1+dfsg1-1~deb10u1 (source amd64 all) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Emilio Pozuelo Monfort)
  • [2020-09-11] Accepted rustc 1.47.0~beta.2+dfsg1-1~exp1 (armel all source) into experimental, experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • [2020-09-05] rustc 1.46.0+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2020-08-29] Accepted rustc 1.46.0+dfsg1-1 (source) into unstable (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-08-14] Accepted rustc 1.46.0~beta.2+dfsg1-1~exp5 (source) into experimental (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-08-12] rustc 1.45.0+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2020-08-11] Accepted rustc 1.46.0~beta.2+dfsg1-1~exp4 (amd64 all source) into experimental, experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • [2020-08-11] Accepted rustc 1.46.0~beta.2+dfsg1-1~exp3 (amd64 all source) into experimental, experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • [2020-08-11] Accepted rustc 1.46.0~beta.2+dfsg1-1~exp2 (amd64 all source) into experimental, experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • [2020-08-11] Accepted rustc 1.46.0~beta.2+dfsg1-1~exp1 (armhf all source) into experimental, experimental (Debian FTP Masters) (signed by: infinity0@debian.org)
  • 1
  • 2
bugs [bug history graph]
  • all: 19 20
  • RC: 3
  • I&N: 13 14
  • M&W: 3
  • F&P: 0
  • patch: 0
  • help: 2
links
  • homepage
  • lintian (4, 21)
  • buildd: logs, exp, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.50.0+dfsg1+llvm-0ubuntu5
  • 4 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing