Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Looking back at all (now) published vulnerabilities in #curl that were present in code from 2020 until now, at no point in those years was the share of "C mistakes" higher than 15% of all vulns.

Looking back at all (now) published vulnerabilities in #curl that were present in code from 2020 until now, at no point in those years was the share of "C mistakes" higher than 15% of all vulns.

Scheduled Pinned Locked Moved Uncategorized
curl
15 Posts 8 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • bagder@mastodon.socialB This user is from outside of this forum
    bagder@mastodon.socialB This user is from outside of this forum
    bagder@mastodon.social
    wrote last edited by
    #1

    Looking back at all (now) published vulnerabilities in #curl that were present in code from 2020 until now, at no point in those years was the share of "C mistakes" higher than 15% of all vulns.

    Through all years, the C mistake share of all vulnerabilities in #curl was never above 45% at any single point in history.

    jake@mastodon.theorangeone.netJ bagder@mastodon.socialB spinnyspinlock@infosec.exchangeS schnedan@social.tchncs.deS G 5 Replies Last reply
    1
    0
    • bagder@mastodon.socialB bagder@mastodon.social

      Looking back at all (now) published vulnerabilities in #curl that were present in code from 2020 until now, at no point in those years was the share of "C mistakes" higher than 15% of all vulns.

      Through all years, the C mistake share of all vulnerabilities in #curl was never above 45% at any single point in history.

      jake@mastodon.theorangeone.netJ This user is from outside of this forum
      jake@mastodon.theorangeone.netJ This user is from outside of this forum
      jake@mastodon.theorangeone.net
      wrote last edited by
      #2

      @bagder What changed ~2018? That's a pretty steep decline in C-related vulnerabilities.

      bagder@mastodon.socialB P 2 Replies Last reply
      0
      • jake@mastodon.theorangeone.netJ jake@mastodon.theorangeone.net

        @bagder What changed ~2018? That's a pretty steep decline in C-related vulnerabilities.

        bagder@mastodon.socialB This user is from outside of this forum
        bagder@mastodon.socialB This user is from outside of this forum
        bagder@mastodon.social
        wrote last edited by
        #3

        @jake I can't say or spot any specific change or process we did that could explain that...

        poliorcetics@social.treehouse.systemsP 1 Reply Last reply
        0
        • bagder@mastodon.socialB bagder@mastodon.social

          Looking back at all (now) published vulnerabilities in #curl that were present in code from 2020 until now, at no point in those years was the share of "C mistakes" higher than 15% of all vulns.

          Through all years, the C mistake share of all vulnerabilities in #curl was never above 45% at any single point in history.

          bagder@mastodon.socialB This user is from outside of this forum
          bagder@mastodon.socialB This user is from outside of this forum
          bagder@mastodon.social
          wrote last edited by
          #4

          we have three more CVEs pending that soon will expand this graph a little, but none of those is a C mistake...

          1 Reply Last reply
          0
          • bagder@mastodon.socialB bagder@mastodon.social

            @jake I can't say or spot any specific change or process we did that could explain that...

            poliorcetics@social.treehouse.systemsP This user is from outside of this forum
            poliorcetics@social.treehouse.systemsP This user is from outside of this forum
            poliorcetics@social.treehouse.systems
            wrote last edited by
            #5

            @bagder @jake pure guess, maybe vulns in curl take years to discover (especially as software engineering techniques improve and make them harder to write in the first place) so we’re not yet seeing the « latest » vulns, only the old ones ?

            It should be fairly easy to disprove though, @bagder do you have data on how long vuln stay in curl on average/median ?

            bagder@mastodon.socialB 1 Reply Last reply
            0
            • jake@mastodon.theorangeone.netJ jake@mastodon.theorangeone.net

              @bagder What changed ~2018? That's a pretty steep decline in C-related vulnerabilities.

              P This user is from outside of this forum
              P This user is from outside of this forum
              pinskia@hachyderm.io
              wrote last edited by
              #6

              @jake @bagder
              There is also a jump after 2012 till 2018 for 'c mistakes'. That is definitely related to better tooling. E.g. sanitizers (which came out in 2012).
              Also as you find the 'C mistakes' ones; there are less of them. And with folks running now with sanitizers on a daily bases, you will find them earlier. Not just about curl project doing it but folks in general.

              bagder@mastodon.socialB 1 Reply Last reply
              0
              • bagder@mastodon.socialB bagder@mastodon.social

                Looking back at all (now) published vulnerabilities in #curl that were present in code from 2020 until now, at no point in those years was the share of "C mistakes" higher than 15% of all vulns.

                Through all years, the C mistake share of all vulnerabilities in #curl was never above 45% at any single point in history.

                spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                spinnyspinlock@infosec.exchange
                wrote last edited by
                #7

                @bagder do you have in mind some interesting or unexpected C ones? only for my curiosity/learning, nothing serious

                bagder@mastodon.socialB 1 Reply Last reply
                0
                • poliorcetics@social.treehouse.systemsP poliorcetics@social.treehouse.systems

                  @bagder @jake pure guess, maybe vulns in curl take years to discover (especially as software engineering techniques improve and make them harder to write in the first place) so we’re not yet seeing the « latest » vulns, only the old ones ?

                  It should be fairly easy to disprove though, @bagder do you have data on how long vuln stay in curl on average/median ?

                  bagder@mastodon.socialB This user is from outside of this forum
                  bagder@mastodon.socialB This user is from outside of this forum
                  bagder@mastodon.social
                  wrote last edited by
                  #8

                  @poliorcetics @jake that's entirely true. Vulns in curl are 8 years old on average when reported! But also: there's no particular age difference between found vulns if they are C mistakes or not, so there's nothing that says they will change a lot. But we don't know...

                  1 Reply Last reply
                  0
                  • P pinskia@hachyderm.io

                    @jake @bagder
                    There is also a jump after 2012 till 2018 for 'c mistakes'. That is definitely related to better tooling. E.g. sanitizers (which came out in 2012).
                    Also as you find the 'C mistakes' ones; there are less of them. And with folks running now with sanitizers on a daily bases, you will find them earlier. Not just about curl project doing it but folks in general.

                    bagder@mastodon.socialB This user is from outside of this forum
                    bagder@mastodon.socialB This user is from outside of this forum
                    bagder@mastodon.social
                    wrote last edited by
                    #9

                    @pinskia @jake yes, the tooling has improved through-out all this time. Also: CI started to become a big thing in the 2015-2020 time-frame and OSS-fuzz started fuzzing curl in 2017

                    1 Reply Last reply
                    0
                    • spinnyspinlock@infosec.exchangeS spinnyspinlock@infosec.exchange

                      @bagder do you have in mind some interesting or unexpected C ones? only for my curiosity/learning, nothing serious

                      bagder@mastodon.socialB This user is from outside of this forum
                      bagder@mastodon.socialB This user is from outside of this forum
                      bagder@mastodon.social
                      wrote last edited by
                      #10

                      @spinnyspinlock we've only had two severity HIGH CVEs in #curl within the last five years, both of them were C mistakes: https://curl.se/docs/CVE-2023-38545.html and https://curl.se/docs/CVE-2021-22901.html

                      spinnyspinlock@infosec.exchangeS 1 Reply Last reply
                      0
                      • bagder@mastodon.socialB bagder@mastodon.social

                        Looking back at all (now) published vulnerabilities in #curl that were present in code from 2020 until now, at no point in those years was the share of "C mistakes" higher than 15% of all vulns.

                        Through all years, the C mistake share of all vulnerabilities in #curl was never above 45% at any single point in history.

                        schnedan@social.tchncs.deS This user is from outside of this forum
                        schnedan@social.tchncs.deS This user is from outside of this forum
                        schnedan@social.tchncs.de
                        wrote last edited by
                        #11

                        @bagder why the shape of vulnerabilities and "C" mistakes align so good?

                        1 Reply Last reply
                        0
                        • bagder@mastodon.socialB bagder@mastodon.social

                          @spinnyspinlock we've only had two severity HIGH CVEs in #curl within the last five years, both of them were C mistakes: https://curl.se/docs/CVE-2023-38545.html and https://curl.se/docs/CVE-2021-22901.html

                          spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                          spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                          spinnyspinlock@infosec.exchange
                          wrote last edited by
                          #12

                          @bagder CVE-2021-22901 was exactly the kind of interesting vulnerability I wanted to see, thank you! well done on the good security track record too 🙂

                          huitema@social.secret-wg.orgH 1 Reply Last reply
                          1
                          0
                          • R relay@relay.infosec.exchange shared this topic
                          • bagder@mastodon.socialB bagder@mastodon.social

                            Looking back at all (now) published vulnerabilities in #curl that were present in code from 2020 until now, at no point in those years was the share of "C mistakes" higher than 15% of all vulns.

                            Through all years, the C mistake share of all vulnerabilities in #curl was never above 45% at any single point in history.

                            G This user is from outside of this forum
                            G This user is from outside of this forum
                            goedelchen@mastodontech.de
                            wrote last edited by
                            #13

                            @bagder Stupid question:
                            What are non-c mistakes? Examples?

                            bagder@mastodon.socialB 1 Reply Last reply
                            0
                            • G goedelchen@mastodontech.de

                              @bagder Stupid question:
                              What are non-c mistakes? Examples?

                              bagder@mastodon.socialB This user is from outside of this forum
                              bagder@mastodon.socialB This user is from outside of this forum
                              bagder@mastodon.social
                              wrote last edited by
                              #14

                              @goedelchen see https://curl.se/docs/security.html

                              1 Reply Last reply
                              0
                              • spinnyspinlock@infosec.exchangeS spinnyspinlock@infosec.exchange

                                @bagder CVE-2021-22901 was exactly the kind of interesting vulnerability I wanted to see, thank you! well done on the good security track record too 🙂

                                huitema@social.secret-wg.orgH This user is from outside of this forum
                                huitema@social.secret-wg.orgH This user is from outside of this forum
                                huitema@social.secret-wg.org
                                wrote last edited by
                                #15

                                @spinnyspinlock @bagder Sanitizers are only as good as code coverage. If code is not exercised when the sanitizer runs, the bug will not be detected.

                                1 Reply Last reply
                                0
                                • R relay@relay.an.exchange shared this topic
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups