Date: Tue, 1 Nov 2022 22:56:23 -0400 From: Demi Marie Obenour <demi@...isiblethingslab.com> To: oss-security@...ts.openwall.com Subject: Re: OpenSSL X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602), X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786) On Tue, Nov 01, 2022 at 04:57:25PM -0400, Jeffrey Walton wrote: > On Tue, Nov 1, 2022 at 3:55 PM Pavan Maddamsetti > <pavan.maddamsetti@...il.com> wrote: > > > > https://github.com/RustCrypto > > I hope this does not start a war.. The problem with Rust is, it's only > guaranteed to work on i686 and x86_64. > > Trying to compile Rust programs on armel, armhf, aarch64 and PowerPC > has been excruciatingly painful. The tool cannot compile its own > cargo's on those platforms. I gave up trying to use Rust on anything > but x86_64. Rust should certainly be able to compile its own Cargo, so this is an outright bug. Please report it. If the instructions are confusing enough that it is easy to make a mistake, that’s a bug in the documentation. -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.