32

A shitpost about languages that generate CVEs

top 19 comments
sorted by: hot top controversial new old
[-] sukhmel@programming.dev 8 points 4 days ago

Also, I like how this problem had a really simple solution all along

There really isn't anything we can do to prevent memory safety vulnerabilities from happening if the programmer doesn't want to write their code in a robust manner.

Yeah, totally, it's all those faulty programmers fault. They should've written good programmes instead of the bad ones, but they just refuse to listen

[-] onlinepersona@programming.dev 5 points 4 days ago* (last edited 4 days ago)

Right, those devs with 20+ years C experience don't know shit about the language and are just lazy. They don't want to catch up with the times and write safe C. It's me, the dude with 5 years of university experience who will set it straight. Look at my hello world program, not a single line of vulnerable code.

Anti Commercial-AI license

[-] sukhmel@programming.dev 3 points 4 days ago

This is not completely wrong, though

[-] onlinepersona@programming.dev 0 points 3 days ago* (last edited 3 days ago)

Yeah, for sure. Human error is involved in C and inertia too. New coding practices and libraries aren't used, tests aren't written, code quality sucks (variable names in C are notoriously cryptic), there's little documentation, many things are rewritten (seems like everybody has rewritten memory allocation at least once), one's casual void * is another's absolute nono, and so on.

C just makes it really easy to make mistakes.

Anti Commercial-AI license

[-] Corbin@programming.dev 2 points 3 days ago

It has nothing to do with knowing the language and everything to do with what's outside of the language. C hasn't resembled CPUs for decades and can't be reasonably retrofitted for safety.

[-] asyncrosaurus@programming.dev 1 points 3 days ago

Well yeah, 100% of programming errors are programmers fault.

[-] refalo@programming.dev 9 points 4 days ago

lol this same post got flagged and taken down from HN

[-] verstra@programming.dev 4 points 4 days ago

Well, lemmy is a place for much more cultured audience. We can appreciate a good shitpost (that does also hold some water).

[-] 0x0@programming.dev 8 points 5 days ago

The "C is bad trope" is getting way too old. I'm surprised the author didn't plug Rust.

the only programming language in the world where these vulnerabilities regularly happen

Maybe because it's one of the most widely used languages in the world...

[-] BatmanAoD@programming.dev 24 points 4 days ago

The trope will be "old" once the mainstream view is no longer that C-style memory management is "good enough".

That said, this particular vulnerability was primarily due to how signals work, which I understand to be kind of unavoidably terrible in any language.

[-] 5C5C5C@programming.dev 4 points 4 days ago

A better language wouldn't have any need to use POSIX signals in this way.

[-] BatmanAoD@programming.dev 7 points 4 days ago

I'm not totally clear on why signals are used here in the first place. Arguably most C code doesn't "need" to use signals in complex ways, either.

[-] sukhmel@programming.dev 8 points 4 days ago

Well, one of the most widely used that allows to do low-level stuff. The most widely used one is by far JavaScript but good luck making an OS or a device driver with it

[-] fuzzzerd@programming.dev 1 points 4 days ago

I'm sure there are projects covering those areas written in JavaScript.

[-] OutsideNo1877@programming.dev 5 points 4 days ago

Just because you can doesn’t mean you should and i hope that is not a thing

[-] echindod@programming.dev 3 points 4 days ago

Oh gawd. That would be so horrible! Is there a project o compile JavaScript to bytecode? With like LLVM? There must be, but I haven't heard of it. I shouldn't even say anything because I will be better off pretending it doesn't exist.

[-] rushaction@programming.dev 2 points 4 days ago

... the only language where 90% of the world's memory safety vulnerabilities have occurred in the last 50 years

Yeah... That's a shit post alright.

I'm not a C developer myself, but that's just a low blow. Also, uncited ;).

[-] verstra@programming.dev 8 points 4 days ago

This is an overstatement, definitely. C is one of the few (main stream) languages where memory safety vulnerabilities are even possible. So if you batch C and C++ together, they probably cover more than 90% of all the memory unsafe cove written in last 50 years, which is a strong implication that they will contribute to 90% of memory vulnerabilities.

All that said, memory vulnerabilities are about 65% of all high implact vulnerabilities on Chromium project^1 and about 70% of vulnerabilities at Microsoft ^2.

[-] 5C5C5C@programming.dev 6 points 4 days ago

Yeah the only way it would be that high is if it lumps C and C++ together. But at that point it may be an underestimate.

this post was submitted on 03 Jul 2024
32 points (77.6% liked)

Programmer Humor

18292 readers
273 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 1 year ago
MODERATORS