Bidi Trojan Source Linter Bypassed in Format Strings #94945
Labels
A-fmt
Area: `core::fmt`
A-lints
Area: Lints (warnings about flaws in source code) such as unused_mut.
A-macros
Area: All kinds of macros (custom derive, macro_rules!, proc macros, ..)
A-security
Area: Security (example: address space layout randomization).
A-Unicode
Area: Unicode
C-bug
Category: This is a bug.
T-compiler
Relevant to the compiler team, which will review and decide on the PR/issue.
This relates to the Trojan Source exploit.
I tried this code:
Where RLO are the raw bytes representing "\u202e" (or any of the other forbidden stateful bidi control characters) does not trigger the linter, whereas e.g.:
Does trigger the linter (as it should).
This was seen with:
I discussed this over e-mail with @pietroalbini and he recommended I post this as a regular issue since most editors / code review sites now handle the bidi stateful controls more gracefully than they did when the bidi trojan vulnerability was original disclosed.
The text was updated successfully, but these errors were encountered: