Conversation

The expectations of software robustness and security have increased a lot, and it's simply not realistic to achieve it while using unsafe tools making it much more difficult to write safe code. Writing something complex like an safe ext4 implementation is C is not very realistic.
1
5
i.e. writing the entire thing with zero memory corruption bugs for an attacker to exploit either via an attacker controlled filesystem or an application. Drivers similarly have to be written treating the hardware and code using them as adversarial. Choice of tools is important.
1
2
This Tweet was deleted by the Tweet author. Learn more
No, that's not what he means. He's saying that an external file system should have a sandboxed filesystem driver, so that exploiting a bug inside it doesn't immediately grant complete control over the entire system and at least requires privesc to escape (likely via the kernel).
1
4
This Tweet was deleted by the Tweet author. Learn more
CVE assignments are a tiny subset of fixed security bugs. GNU grep does not seek CVE assignments for each security bug that they fix. Only external security researchers generally have an interest in seeking CVE assignments and it's mostly for self-promotion. It's the exception.
1
1
Try reading what I linked to you including the official Linux kernel documentation and the post by Greg KH where they explain that they don't seek CVE assignments. Greg KH has explained many times that most security bugs do not receive CVEs so backporting only those is awful.
1
1
malloc(n * sizeof(T)) or realloc(p, n* sizeof(T)) where n is an attacker controlled value is ridiculously obvious low-hanging fruit that's somehow present in tons of projects. It's usually not one line but there are enough of those that it's easy to find cases to check with grep.
1