Rust Bugs Uncovered
Executive TL;DR
- Rust’s standard library has limitations that can lead to security vulnerabilities.
- Even experienced developers can introduce bugs when working with Unix APIs.
- Rust’s memory safety features are not foolproof.
The Buzz Score
The Internet’s Verdict: 70% Hyped, 30% Skeptical
Forum Voices
Developers are weighing in on the issue, with one maintainer of GNU Coreutils stating:
Hi, I am one of the maintainers of GNU Coreutils. Thanks for the article, it covers some interesting topics. In the little Rust that I have used, I have felt that it is far too easy to write TOCTOU races using std::fs.
Another developer notes that:
The pattern is always the same. You do one syscall to check something about a path, then another syscall to act on the same path. Between those two calls, an attacker with write access to a parent directory can swap the path component for a symbolic link.
Conclusion
Rust’s security features are not a replacement for careful coding practices and a deep understanding of Unix APIs.
Focus Keyword: Rust Security