Debian Package Tracker
Register | Log in
Subscribe

rust-rustix

Safe Rust bindings to POSIX/Unix/Linux/Winsock-like syscalls - Rust source code

Choose email to subscribe with

general
  • source: rust-rustix (main)
  • version: 0.38.37-4
  • maintainer: Debian Rust Maintainers (archive) (DMD)
  • uploaders: John Goerzen [DMD]
  • arch: any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 0.35.12-1
  • testing: 0.38.37-1
  • unstable: 0.38.37-4
versioned links
  • 0.35.12-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.38.37-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.38.37-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • librust-rustix-dev
action needed
A new upstream version is available: 1.0.7 high
A new upstream version 1.0.7 is available, you should consider packaging it.
Created: 2024-10-31 Last update: 2025-05-17 09:00
lintian reports 1 error and 3 warnings high
Lintian reports 1 error and 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-05-15 Last update: 2025-05-15 04:03
debian/patches: 7 patches to forward upstream low

Among the 7 debian patches available in version 0.38.37-4 of the package, we noticed the following issues:

  • 7 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-05-15 08:34
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2024-43806: (needs triaging) Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the `Dir` iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux's various virtual file systems (e.g. `/proc`, `/sys`) can contain directories that spontaneously pop in and out of existence. Attempting to iterate over them using `rustix::fs::Dir` directly or indirectly (e.g. with the `procfs` crate) can trigger this fault condition if the implementation decides to continue on errors. An attacker knowledgeable about the implementation details of a vulnerable target can therefore try to trigger this fault condition via any one or a combination of several available APIs. If successful, the application host will quickly run out of memory, after which the application will likely be terminated by an OOM killer, leading to denial of service. This issue has been addressed in release versions 0.35.15, 0.36.16, 0.37.25, and 0.38.19. Users are advised to upgrade. There are no known workarounds for this issue.

You can find information about how to handle this issue in the security team's documentation.

Created: 2024-08-28 Last update: 2025-05-15 00:00
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2023-06-14 Last update: 2023-06-14 07:03
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-05-14 23:00
testing migrations
  • excuses:
    • Migration status for rust-rustix (0.38.37-1 to 0.38.37-4): BLOCKED: Needs an approval (either due to a freeze, the source suite or a manual hint)
    • Issues preventing migration:
    • ∙ ∙ blocked by freeze: is a key package (Follow the freeze policy when applying for an unblock)
    • ∙ ∙ Too young, only 2 of 20 days old
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/r/rust-rustix.html
    • ∙ ∙ autopkgtest for rust-rustix/0.38.37-4: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on armhf - info ♻
    • ∙ ∙ Reproducible on i386 - info ♻
    • Not considered
news
[rss feed]
  • [2025-05-14] Accepted rust-rustix 0.38.37-4 (source) into unstable (Fabian Grünbichler)
  • [2025-05-13] Accepted rust-rustix 0.38.37-3 (source) into unstable (Fabian Grünbichler)
  • [2025-05-09] Accepted rust-rustix 0.38.37-2 (source) into unstable (Fabian Grünbichler)
  • [2024-10-20] rust-rustix 0.38.37-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-11] Accepted rust-rustix 0.38.37-1 (source) into unstable (Blair Noctis)
  • [2024-04-19] rust-rustix 0.38.32-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-16] Accepted rust-rustix 0.38.32-1 (source) into unstable (Peter Michael Green)
  • [2024-01-17] rust-rustix 0.38.30-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-15] Accepted rust-rustix 0.38.30-1 (source) into unstable (Peter Michael Green)
  • [2023-11-30] rust-rustix 0.38.25-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-27] Accepted rust-rustix 0.38.25-1 (source) into unstable (Andreas Henriksson)
  • [2023-11-10] rust-rustix 0.38.21-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-07] Accepted rust-rustix 0.38.21-1 (source) into unstable (Peter Michael Green)
  • [2023-10-15] rust-rustix 0.38.17-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-08] Accepted rust-rustix 0.38.17-1 (source) into unstable (Peter Michael Green)
  • [2023-08-27] Accepted rust-rustix 0.38.9-1 (source) into experimental (Peter Michael Green)
  • [2023-06-25] rust-rustix 0.37.20-2 MIGRATED to testing (Debian testing watch)
  • [2023-06-14] Accepted rust-rustix 0.37.20-2 (source) into unstable (Peter Michael Green)
  • [2023-06-13] Accepted rust-rustix 0.37.20-1 (source) into unstable (Michael Tokarev)
  • [2022-11-05] rust-rustix 0.35.12-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-29] Accepted rust-rustix 0.35.12-1 (source) into unstable (Peter Michael Green)
  • [2022-10-27] Accepted rust-rustix 0.35.6-3 (source) into unstable (John Goerzen)
  • [2022-10-27] Accepted rust-rustix 0.35.6-2 (source amd64) into unstable (John Goerzen)
  • [2022-10-22] Accepted rust-rustix 0.35.6-1 (source amd64) into unstable (Debian FTP Masters) (signed by: John Goerzen)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (1, 3)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.38.37-4

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing