Conversation

university of minnesota today coming out with groundbreaking research that the best C programmers in the world can't tell if you're giving them bad C maybe C is bad
28
634
"actually c is fine if you just never make any mistakes" Actually chris the developers of the god damn linux kernel are not even this superhuman so i seriously doubt you are
5
259
but also to be clear, deliberately trying to sneak vulnerabilities into someone else's software without their knowledge is pretty fucked up, what
8
225
Replying to
I feel like I would have been tricked by this regardless of the programming language literally just on the basis of the authority of "affiliated with the university of minnesota"
4
38
Replying to and
yeah this is mostly that they sent a bunch of patches claiming to be fixing issues found by static analysis tools, implying that they knew what they were doing, and coming from a reasonably trustworthy source --> the patches got fairly little review
3
18
Replying to and
yeah, now that they've published and humans are actually looking at them they're going "wow this is obvious trash", just, when they were first submitted they mostly got "alright I'll take your word for it" like, C has plenty of problems but this isn't really related to them
5
24
It has a lot to do with the language. In most statically typed languages, these kinds of mistakes don't give you don't execution vulnerabilities. You would have to very explicitly dynamically load code or use explicitly unsafe APIs which result in scrutiny not otherwise applied.
1
In C, everything is unsafe code. There is nowhere that you cannot get code execution vulnerabilities via a tiny mistake. You're always just about to have one of those vulnerabilities if you make the slightest mistake in the most innocuous code unrelated to access control, etc.