The Rust Security Response WG handles vulnerability reports and security issues for all the repositories in the rust-lang and rust-lang-nursery organizations. If you found a vulnerability please report it according to the security policy on our website. Thanks!
Security: rust-lang/rust
Security
SECURITY.md
-
`std::process::Command` batch files argument escaping could be bypassed with trailing whitespace or periodsGHSA-2xg3-7mm6-98jj published
Sep 4, 2024 by pietroalbiniLow -
`std::process::Command` did not properly escape arguments of batch files on WindowsGHSA-q455-m56c-85mh published
Apr 9, 2024 by pietroalbiniCritical -
Race condition in std::fs::remove_dir_allGHSA-r9cc-f5pr-p3j2 published
Jan 20, 2022 by pietroalbiniHigh -
rustc and bidirectional-override codepoints in source codeGHSA-rcv6-wg5m-24v6 published
Nov 1, 2021 by steveklabnikModerate -
Cargo prior to Rust 1.26.0 may download the wrong dependencyGHSA-phjm-8x66-qw4r published
Sep 30, 2019 by alexcrichtonModerate
Learn more about advisories related to rust-lang/rust in the GitHub Advisory Database