A shitpost about languages that generate CVEs

13 points

Also, I like how this problem had a really simple solution all along

There really isn’t anything we can do to prevent memory safety vulnerabilities from happening if the programmer doesn’t want to write their code in a robust manner.

Yeah, totally, it’s all those faulty programmers fault. They should’ve written good programmes instead of the bad ones, but they just refuse to listen

permalink
report
reply
7 points
*

Right, those devs with 20+ years C experience don’t know shit about the language and are just lazy. They don’t want to catch up with the times and write safe C. It’s me, the dude with 5 years of university experience who will set it straight. Look at my hello world program, not a single line of vulnerable code.

Anti Commercial-AI license

permalink
report
parent
reply
5 points

This is not completely wrong, though

permalink
report
parent
reply
0 points
*

Yeah, for sure. Human error is involved in C and inertia too. New coding practices and libraries aren’t used, tests aren’t written, code quality sucks (variable names in C are notoriously cryptic), there’s little documentation, many things are rewritten (seems like everybody has rewritten memory allocation at least once), one’s casual void * is another’s absolute nono, and so on.

C just makes it really easy to make mistakes.

Anti Commercial-AI license

permalink
report
parent
reply
2 points

It has nothing to do with knowing the language and everything to do with what’s outside of the language. C hasn’t resembled CPUs for decades and can’t be reasonably retrofitted for safety.

permalink
report
parent
reply
1 point

Well yeah, 100% of programming errors are programmers fault.

permalink
report
parent
reply
11 points

lol this same post got flagged and taken down from HN

permalink
report
reply
5 points

Well, lemmy is a place for much more cultured audience. We can appreciate a good shitpost (that does also hold some water).

permalink
report
parent
reply
10 points

The “C is bad trope” is getting way too old. I’m surprised the author didn’t plug Rust.

the only programming language in the world where these vulnerabilities regularly happen

Maybe because it’s one of the most widely used languages in the world…

permalink
report
reply
28 points

The trope will be “old” once the mainstream view is no longer that C-style memory management is “good enough”.

That said, this particular vulnerability was primarily due to how signals work, which I understand to be kind of unavoidably terrible in any language.

permalink
report
parent
reply
4 points

A better language wouldn’t have any need to use POSIX signals in this way.

permalink
report
parent
reply
9 points

I’m not totally clear on why signals are used here in the first place. Arguably most C code doesn’t “need” to use signals in complex ways, either.

permalink
report
parent
reply
11 points

Well, one of the most widely used that allows to do low-level stuff. The most widely used one is by far JavaScript but good luck making an OS or a device driver with it

permalink
report
parent
reply
1 point

I’m sure there are projects covering those areas written in JavaScript.

permalink
report
parent
reply
6 points

Just because you can doesn’t mean you should and i hope that is not a thing

permalink
report
parent
reply
4 points

Oh gawd. That would be so horrible! Is there a project o compile JavaScript to bytecode? With like LLVM? There must be, but I haven’t heard of it. I shouldn’t even say anything because I will be better off pretending it doesn’t exist.

permalink
report
parent
reply
2 points

… the only language where 90% of the world’s memory safety vulnerabilities have occurred in the last 50 years

Yeah… That’s a shit post alright.

I’m not a C developer myself, but that’s just a low blow. Also, uncited ;).

permalink
report
reply
9 points
*

This is an overstatement, definitely. C is one of the few (mainstream) languages where memory safety vulnerabilities are even possible. So if you batch C and C++ together, they probably cover more than 90% of all the memory unsafe cove written in last 50 years, which is a strong implication that they will contribute to 90% of memory vulnerabilities.

All that said, memory vulnerabilities are about 65% of all high implact vulnerabilities on Chromium project[1] and about 70% of vulnerabilities at Microsoft [2].


  1. https://www.chromium.org/Home/chromium-security/memory-safety/ ↩︎

  2. https://github.com/microsoft/MSRC-Security-Research/blob/master/presentations/2019_02_BlueHatIL/2019_02 - BlueHatIL - Trends%2C challenge%2C and shifts in software vulnerability mitigation.pdf ↩︎

permalink
report
parent
reply
1 point

So we’d only fix 70% of vulnerabilities by switching to rust? Not enough! Better keep writing C/C++!

permalink
report
parent
reply
6 points

Yeah the only way it would be that high is if it lumps C and C++ together. But at that point it may be an underestimate.

permalink
report
parent
reply

Programmer Humor

!programmer_humor@programming.dev

Create post

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

  • Keep content in english
  • No advertisements
  • Posts must be related to programming or programmer topics

Community stats

  • 7K

    Monthly active users

  • 730

    Posts

  • 11K

    Comments