RustSec is a community database of security advisories filed against crates published to crates.io. It is maintained by the Rust Secure Code Working Group.
The following security issues have been identified in Rust crates in April 2020:
- rusqlite: Various memory safety issues
- os_str_bytes: Relies on undefined behavior of
char::from_u32_unchecked
- flatbuffers:
read_scalar
andread_scalar_at
allow transmuting values withoutunsafe
blocks
You can use cargo-audit to check whether your code depends on vulnerable versions of these crates and upgrade. A GitHub action that files bugs if your code depends on vulnerable crates is also available.
Additionally, we have published security advisories for two crates that intentionally violate Rust's memory safety guarantees: fake-static and plutonium. This has proven to be controversial, so we have retracted the latter advisory for the time being.
We are currently soliciting input on how you would like such issues to be surfaced (if at all). You can find more details and contribute here. We're using Reddit to solicit input because its threaded conversation system enables much more structured discussion than a single forum thread.