Skip Navigation

Fast memory vulnerabilities, written in 100% safe Rust

github.com GitHub - Speykious/cve-rs: Blazingly πŸ”₯ fast πŸš€ memory vulnerabilities, written in 100% safe Rust. πŸ¦€

Blazingly πŸ”₯ fast πŸš€ memory vulnerabilities, written in 100% safe Rust. πŸ¦€ - Speykious/cve-rs

GitHub - Speykious/cve-rs: Blazingly πŸ”₯ fast πŸš€ memory vulnerabilities, written in 100% safe Rust. πŸ¦€
15
Hacker News @lemmy.smeargle.fans bot @lemmy.smeargle.fans
BOT
Fast memory vulnerabilities, written in 100% safe Rust

You're viewing a single thread.

15 comments
  • For anyone who is confused: This is exploiting an old soundness bug in the Rust compiler that is still present. The GitHub issue page has this comment from maintainers:

    we already had a crate published on crates.io before which used this bug to transmute in safe code, see #25860 (comment).

    this issue is a priority to fix for the types team and has been so for years now. there is a reason for why it is not yet fixed. fixing it relies on where-bounds on binders which are blocked on the next-generation trait solver. we are actively working on this and cannot fix the unsoundness before it's done.

You've viewed 15 comments.