logoalt Hacker News

Security vulnerability found in Rust Linux kernel code

34 pointsby lelanthrantoday at 6:33 AM17 commentsview on HN

Comments

jsiepkestoday at 11:54 AM

I don't get why this is noteworthy? It's literally a piece of code in a Rust "unsafe" block. If you put something in an "unsafe" block the compiler isn't going to help you, you are on your own. That's why it's called "unsafe".

Now what is kinda interesting is that instead of getting rid of the "unsafe" block the developers put in some extra check. I guess you can take the developer out of C but you can't take the C out of the developer?

show 1 reply
aw1621107today at 8:11 AM

Effectively a dupe of this thread from ~14 hours ago: https://news.ycombinator.com/item?id=46302621 (130 comments as of this comment)

thesztoday at 9:06 AM

The mistake there is a classical example of why (software) transactional memory is valuable. Double linked lists are trivial in single core execution, need PhD level understanding of everything in multicore execution and become trivial again in multicore execution with (S)TM.

Rust has troubles with STM because it lacks anything resembling effect system. Most probably, this will not be fixed.

show 1 reply
dizhntoday at 8:03 AM

The URL this points to does not say anything about security. There's an example of a race condition causing memory corruption and a crash.

show 1 reply
arowthwaytoday at 9:53 AM

I hate this bot-detection anime girl popping up on my monitor while I pretend to be working. Same goes for the funny pictures at the beginning of some Github readmes. Sorry for complaining about a tangential annoyance, but I haven't seen this particular sentiment expressed yet.

show 4 replies
pityJuketoday at 7:25 AM

Within the Android drivers, right?

show 2 replies