Herb Sutter on increasing safety in C++
Herb Sutter on increasing safety in C++
Posted Mar 13, 2024 7:11 UTC (Wed) by LtWorf (subscriber, #124958)In reply to: Herb Sutter on increasing safety in C++ by khim
Parent article: Herb Sutter on increasing safety in C++
Do it from a few clients and and you got your memory full :)
Who wouldn't consider this a vulnerability?
      Posted Mar 13, 2024 9:51 UTC (Wed)
                               by khim (subscriber, #9252)
                              [Link] (4 responses)
       And then your process is killed and restarted. That's DoS attack, not a vulnerability. Most developers, I suspect. If the worst outcome is “your service doesn't respond because it's clogged with requests” then usually it's achievable without any vulnerability and said bug doesn't give you the ability to do more than that. P.S. Actually I suspect under new rule kernel guys would give it a CVE because their goal is to ensure that no vulnerabilities would be unmarked, not to paint the whole world into black and write colors for the PHB to be happy, somehow. Compared to CVE-2023-52472 this is, indeed, serious vulnerability. But before CVE process was exposes as meaningless farce only Rust guys cared about stuff like that. 
     
    
      Posted Mar 13, 2024 10:55 UTC (Wed)
                               by cmeerw (guest, #555)
                              [Link] (2 responses)
       
     
    
      Posted Mar 13, 2024 11:06 UTC (Wed)
                               by khim (subscriber, #9252)
                              [Link] (1 responses)
       Well… that's year 2003. Maybe in year 2045 Rust, too, would devolve to the state where we would need another new language for safety. 
     
    
      Posted Mar 13, 2024 11:15 UTC (Wed)
                               by cmeerw (guest, #555)
                              [Link] 
       Yes, that's year 2003. Not sure what you are trying to say. You were earlier claiming "only Rust guys cared about stuff like that" and "how many C/C++ developers do you know that would accept that as an actual vulnerability". Looks like people care about stuff like that since at least 2003 - and there was quite a bit of publicity about that around that time. It even has it's own Wikipedia entry. 
     
      Posted Mar 13, 2024 11:19 UTC (Wed)
                               by LtWorf (subscriber, #124958)
                              [Link] 
       
From the other comments I think that you are not using rationality when talking about rust. 
A full memory might easily mean degraded performances and swap, rather than a service being restarted (hoping that the OOMkiller picks the right process). 
     
      Posted Mar 13, 2024 21:40 UTC (Wed)
                               by dvdeug (guest, #10998)
                              [Link] 
       
     
    
      > Do it from a few clients and and you got your memory full :)
Herb Sutter on increasing safety in C++
      
      see CVE-2003-1564 (billion laughs attack)
      
          Herb Sutter on increasing safety in C++
      Herb Sutter on increasing safety in C++
      Herb Sutter on increasing safety in C++
      Herb Sutter on increasing safety in C++
      
Herb Sutter on increasing safety in C++
      
 
           