Deutsch   English   Français   Italiano  
<wwv8qlla671.fsf@LkoBDZeT.terraraq.uk>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!nntp-feed.chiark.greenend.org.uk!ewrotcd!nntp.terraraq.uk!.POSTED.tunnel.sfere.anjou.terraraq.org.uk!not-for-mail
From: Richard Kettlewell <invalid@invalid.invalid>
Newsgroups: comp.os.linux.misc
Subject: Re: VMS
Date: Sat, 21 Jun 2025 08:45:38 +0100
Organization: terraraq NNTP server
Message-ID: <wwv8qlla671.fsf@LkoBDZeT.terraraq.uk>
References: <wCqdnYde9MIbmND1nZ2dnZfqnPadnZ2d@giganews.com>
	<102ka4k$9umt$2@dont-email.me> <87tt4i9nw5.fsf@eder.anydns.info>
	<102l0h9$fjtb$5@dont-email.me>
	<Z2udned3u9ZgqtP1nZ2dnZfqnPudnZ2d@giganews.com>
	<slrn1054j9c.3ce8.candycanearter07@candydeb.host.invalid>
	<PpudnVnCnvuYxc_1nZ2dnZfqnPudnZ2d@giganews.com>
	<wwva564xjps.fsf@LkoBDZeT.terraraq.uk>
	<4_GdncCsf-Nqe8n1nZ2dnZfqnPSdnZ2d@giganews.com>
	<10338ls$lpbg$4@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: innmantic.terraraq.uk; posting-host="tunnel.sfere.anjou.terraraq.org.uk:172.17.207.6";
	logging-data="157564"; mail-complaints-to="usenet@innmantic.terraraq.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Cancel-Lock: sha1:6yv4mLudmTb8+EIZQn3bdC+ZLQU=
X-Face: h[Hh-7npe<<b4/eW[]sat,I3O`t8A`(ej.H!F4\8|;ih)`7{@:A~/j1}gTt4e7-n*F?.Rl^
     F<\{jehn7.KrO{!7=:(@J~]<.[{>v9!1<qZY,{EJxg6?Er4Y7Ng2\Ft>Z&W?r\c.!4DXH5PWpga"ha
     +r0NzP?vnz:e/knOY)PI-
X-Boydie: NO

The Natural Philosopher <tnp@invalid.invalid> writes:
> On 20/06/2025 05:43, c186282 wrote:

>>> The software industry has been trying this for decades now. It does
>>> not work.
>>    At some point, soon, they need to start flagging
>>    the unsafe functions as ERRORS, not just WARNINGS.
>
> The problem is that C was designed by two smart people to run on small
> hardware for use by other  smart people.

Well, maybe, but the original Unix team still ended up with buffer
overruns in their code. There’s a famous one in V7 mkdir, which ran with
elevated privileged due to the inadequate kernel API. I’ve not tried to
exploit it but it’s a pretty straightforward array overrun so almost
certainly exploitable to escalate from a mortal user to root.

-- 
https://www.greenend.org.uk/rjk/