The following versions of fastalloc are currently supported with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability in fastalloc, please report it responsibly.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please send an email to: eshanized@proton.me
Include the following information:
- Type of vulnerability
- Full description of the vulnerability
- Steps to reproduce or proof of concept
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours of submission
- Initial Assessment: Within 7 days
- Status Updates: Every 7 days until resolution
- Fix Timeline: We aim to release fixes for critical vulnerabilities within 30 days
- We request that you give us reasonable time to fix the vulnerability before public disclosure
- We will acknowledge your contribution in the security advisory (unless you prefer to remain anonymous)
- Once fixed, we will publish a security advisory
When using fastalloc:
- Keep Updated: Always use the latest version
- Review Dependencies: Use
cargo auditregularly - Bounds Checking: Enable debug assertions during development
- Statistics: Use the
statsfeature to monitor for unusual allocation patterns - Thread Safety: Use appropriate pool types for your concurrency needs
- fastalloc minimizes
unsafecode - All
unsafeblocks are documented with safety invariants - Debug builds include additional runtime checks
- Miri testing is part of our CI pipeline
- Thread-safe pools use proper synchronization
- Thread-local pools explicitly prevent cross-thread usage
- No data races possible with safe API usage
- Pool exhaustion returns errors rather than panicking
- Maximum capacity limits can prevent unbounded growth
- Statistics help detect resource exhaustion patterns
Optional features for enhanced security:
[dependencies]
fastalloc = { version = "0.1", features = ["stats"] }Monitor allocation patterns to detect:
- Unusual allocation rates
- Memory exhaustion attempts
- Resource leaks
We appreciate responsible disclosure. Contributors will be listed here:
- (No vulnerabilities reported yet)
For security-related questions: eshanized@proton.me
For general questions: Open an issue on GitHub at https://github.com/TIVerse/fastalloc/issues