Screenshot of the part of the article mentioned in the opening post where other affected languages are mentioned.
Notices where this attachment appears
-
Embed this notice
@r000t The vulnerability has nothing to do with memory safety though — they just don't sanitize the arguments passed to cmd thoroughly enough and you can append calling other batch files to it, that's why it's Windows specific.
Personally, I doubt that it's standard library's call at all to do this :marseyshrug:
Not only Rust is affected, but every other language that has similar facilities in the standard library producing binaries that run in Windows — it's even mentioned in the article. And as you can see, for most of them the fix is to mention it in the documentation, for Java it's explicit WONTFIX even. The headline is made clickbait on purpose by Rust being mentioned IMO, no other tech news website put it that way — that is why I have failed to find a similar article on Slashdot or The Register and had to go to Bleeping Computer itself to read about it.