• FizzyOrange@programming.dev
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    security vulnerabilities are simply bugs

    I don’t know how he can still maintain this clearly insane stance. Pride?

    Torvalds expressed disappointment in the slow adoption of Rust due to factors like resistance from older kernel developers and instability in Rust infrastructure.

    This is a good sign at least!

    potential for AI tools to assist in code review and bug detection

    Definitely agree here. One thing I really liked that I saw a while ago is colour coding code based on how “surprising” each token was to the LLM, the idea being bugs would be more surprising. Neat idea. It didn’t seem to actually work very well but maybe it could be improved.

    Biggest issue I have is that no company I’ve worked for is ever going to be ok with sending our code to some AI company’s servers, and the options for local models are super limited. So I can’t actually use any of this stuff except for hobbies.

    • Björn Tantau@swg-empire.de
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      security vulnerabilities are simply bugs

      I don’t know how he can still maintain this clearly insane stance. Pride?

      How else should it be handled?

      • FizzyOrange@programming.dev
        link
        fedilink
        arrow-up
        0
        ·
        3 months ago

        Should what be handled? Security vulnerabilities? Here’s how you should handle security bugs differently to other bugs:

        1. Report them separately and clearly. Don’t hide by omission the fact that they are security bugs (common practice in Linux apparently). Coordinate with major vendors how to push fixes.

        2. They are generally more important than other bugs so you should put more effort into detecting and preventing them. E.g. using fuzzing, sandboxing, formal methods, safer languages, safety annotations, etc.

        3. They have high value on the grey market and people actively try to create them, so you need to design your system under that assumption. An obvious thing to do is software isolation so a bug in - to pick a random example xz - can’t bring down ssh. Software isolation, microkernels, sandboxing etc. help with this.

        There’s no way you can say “they’re just bugs”. Maybe in the 80s. It’s not the 80s.

        • Björn Tantau@swg-empire.de
          link
          fedilink
          arrow-up
          0
          ·
          3 months ago

          Report them separately and clearly. Don’t hide by omission the fact that they are security bugs (common practice in Linux apparently). Coordinate with major vendors how to push fixes.

          That’s exactly how it works. Vulnerability found, reported and fixed in secret and when everything is in place everyone is informed to update.

          They are generally more important than other bugs so you should put more effort into detecting and preventing them. E.g. using fuzzing, sandboxing, formal methods, safer languages, safety annotations, etc.

          I don’t want to sound condescending, but what do you think all this talk about Rust and AI tools is about?

          In the end you want to prevent all bugs from happening. Some filesystem bug randomly deleting data can be just as catastrophic as remote code execution.

          And if some feature turns out to be a gaping security hole you’ll quickly see it turn into a bug. That’s what the quote is about. Every security issue is a bug so it has to be handled like a bug and squashed.

          Priority in bugs exist independent of them being security related or something else. A critical bug will always get the highest priority fix.