You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We need to make discovering that you need to apply security updates and applying them it as easy and obvious as possible.
Production deployments have higher security requirements than development environments. Therefore auditing and fixing deployed binaries is higher priority than auditing source code.
How do you set up a pipeline to apply these updates automatically?
How should fixes in compiler or standard library bugs be applied? Currently there is no "rebuild everything that was ever installed" command in Cargo. Also, how do we notify people that they need to rebuild everything?
How should security updates to statically linked C libraries be handled? What if the build is for Windows where the only reasonable way to build against C libraries is to bundle them with the -sys crate? Should the maintainer of Rust -sys crate be responsible for security updates to the C code, and if so, how do we make that manageable for the maintainer?
The text was updated successfully, but these errors were encountered:
We need to make discovering that you need to apply security updates and applying them it as easy and obvious as possible.
Production deployments have higher security requirements than development environments. Therefore auditing and fixing deployed binaries is higher priority than auditing source code.
Hard questions:
-sys
crate? Should the maintainer of Rust-sys
crate be responsible for security updates to the C code, and if so, how do we make that manageable for the maintainer?The text was updated successfully, but these errors were encountered: