rust:edge is vulnerable to denial of service. The vulnerability exists as it permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logical ordering of tokens ingested by compilers and interpreters causing an application crash.
www.openwall.com/lists/oss-security/2021/11/01/1
www.openwall.com/lists/oss-security/2021/11/01/4
www.openwall.com/lists/oss-security/2021/11/01/5
www.openwall.com/lists/oss-security/2021/11/01/6
www.openwall.com/lists/oss-security/2021/11/02/10
www.unicode.org/versions/Unicode14.0.0/
lists.fedoraproject.org/archives/list/[email protected]/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
lists.fedoraproject.org/archives/list/[email protected]/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
lists.fedoraproject.org/archives/list/[email protected]/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
secdb.alpinelinux.org/edge/community.yaml
security.gentoo.org/glsa/202210-09
trojansource.codes
www.kb.cert.org/vuls/id/999008
www.scyon.nl/post/trojans-in-your-source-code
www.starwindsoftware.com/security/sw-20220804-0002/
www.unicode.org/reports/tr31/
www.unicode.org/reports/tr36/
www.unicode.org/reports/tr39/
www.unicode.org/reports/tr9/tr9-44.html#HL4