Re: Algol For Linux

Liste des GroupesRevenir à c misc 
Sujet : Re: Algol For Linux
De : cross (at) *nospam* spitfire.i.gajendra.net (Dan Cross)
Groupes : comp.misc
Date : 21. Jul 2025, 16:53:03
Autres entêtes
Organisation : PANIX Public Access Internet and UNIX, NYC
Message-ID : <105lnov$2s9$1@reader1.panix.com>
References : 1 2 3 4
User-Agent : trn 4.0-test77 (Sep 1, 2010)
In article <wwvo6tnp4z6.fsf@LkoBDZeT.terraraq.uk>,
Richard Kettlewell  <invalid@invalid.invalid> wrote:
kludge@panix.com (Scott Dorsey) writes:
Lawrence D'Oliveiro  <ldo@nz.invalid> wrote:
Ben Collver wrote:
Memory Safety Since 1958
>
Kidding, right?
>
He's probably kidding but he's got a point.
>
The number one security problem with Linux is null-terminated strings.
>
I’m not convinced. I skimmed the CVEs listed in [1] and only one of them
had a clear relationship to 0-terminated strings, and even that is a
false positive from Fortify.
>
[1] https://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2025/Linux-Linux-Kernel.html
>
0-terminated strings are certainly a bad design (for multiple reasons)
but there’s a lot of other well-known security pitfalls in the C
language.

I believe Scott was attempting to riff on the overall joke.

- Dan C.


Date Sujet#  Auteur
13 Jul 25 * Algol For Linux11Ben Collver
13 Jul 25 +* Re: Algol For Linux4Lawrence D'Oliveiro
14 Jul 25 i`* Re: Algol For Linux3Scott Dorsey
14 Jul 25 i `* Re: Algol For Linux2Richard Kettlewell
21 Jul16:53 i  `- Re: Algol For Linux1Dan Cross
13 Jul 25 +- Re: Algol For Linux1yeti
14 Jul 25 +- Re: Algol For Linux1Sylvia Else
20 Jul14:50 +* Re: Algol For Linux3Sylvia Else
20 Jul17:48 i+- Re: Algol For Linux1yeti
20 Jul21:23 i`- Re: Algol For Linux1Richard Kettlewell
20 Jul04:07 `- Re: Algol For Linux1Lawrence D'Oliveiro

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal