Skip to content

Commit 3b5aa44

Browse files
committed
Remove additional mention of disabling features
1 parent dc5745d commit 3b5aa44

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

src/doc/rustc/src/exploit-mitigations.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,14 +23,15 @@ Furthermore, the Rust code and documentation encourage creating safe
2323
abstractions over unsafe code. This can cause a false sense of security if
2424
unsafe code is not properly reviewed and tested.
2525

26-
Unsafe Rust disables some of the features that provide memory and thread
27-
safety guarantees. This causes programs or libraries to be susceptible to
28-
memory corruption (CWE-119)[8] and concurrency issues (CWE-557)[9]. Modern C
29-
and C++ compilers provide exploit mitigations to increase the difficulty to
30-
exploit vulnerabilities resulting from these issues. Therefore, the Rust
31-
compiler must also support these exploit mitigations in order to mitigate
32-
vulnerabilities resulting from the use of Unsafe Rust. This chapter is going
33-
to document these exploit mitigations and how they apply to Rust.
26+
Unsafe Rust introduces features that do not provide the same memory and
27+
thread safety guarantees. This causes programs or libraries to be
28+
susceptible to memory corruption (CWE-119)[8] and concurrency issues
29+
(CWE-557)[9]. Modern C and C++ compilers provide exploit mitigations to
30+
increase the difficulty to exploit vulnerabilities resulting from these
31+
issues. Therefore, the Rust compiler must also support these exploit
32+
mitigations in order to mitigate vulnerabilities resulting from the use of
33+
Unsafe Rust. This chapter is going to document these exploit mitigations and
34+
how they apply to Rust.
3435

3536

3637
## Exploit mitigations

0 commit comments

Comments
 (0)