The vulnerability, which carries a perfect 10 base severity score, is tracked as CVE-2024-24576. It affects the Rust standard library, which was found to be improperly escaping arguments when invoking batch files on Windows using the Command API.

  • @[email protected]
    link
    fedilink
    English
    246 months ago

    Interesting how this has been widely reported as a Rust issue but the fact that other languages have no patches yet or do not even plan to patch it has seen little attention.

      • @[email protected]
        link
        fedilink
        English
        116 months ago

        Yeah, seems very much like “Rust fails to implement elaborate enough workaround for a stupid design choice in Windows”.

    • @whereisk
      link
      English
      46 months ago

      I think it’s partly because Rust has been promoted as inherently secure.

      • @[email protected]
        link
        fedilink
        English
        96 months ago

        But nothing is so secure that it automatically fixes all design flaws in everything it interacts with.

        • @whereisk
          link
          English
          46 months ago

          Absolutely. I merely suggested a contributing factor to answer why media coverage seems so focused on Rust.