On Fri, Jul 12, 2013 at 5:55 PM, Robert O'Callahan <rob...@ocallahan.org>wrote:
> A quick scan suggests that all 34 sec-critical bugs filed against Web > Audio so far are either buffer overflows (array-access-out-of-bounds, > basically) or use-after-free. In many cases the underlying bug is something > quite different, sometimes integer overflows. > There are 4 sec-high bugs --- DOS with a null-pointer-deref, and a few bugs reading uninitialized memory. The latter would be prevented by Rust, and the former would be mitigated to the extent Servo uses the fine-grained isolation Rust offers. There are no sec-low bugs. Web Audio is an example of a feature which has very little security impact of its own. Its security impact is entirely due to bugs where violation of language rules can trigger arbitrary behavior. Rust prevents such bugs. A lot of Web features are in this category. Rob -- Jtehsauts tshaei dS,o n" Wohfy Mdaon yhoaus eanuttehrotraiitny eovni le atrhtohu gthot sf oirng iyvoeu rs ihnesa.r"t sS?o Whhei csha iids teoa stiheer :p atroa lsyazye,d 'mYaonu,r "sGients uapr,e tfaokreg iyvoeunr, 'm aotr atnod sgaoy ,h o'mGee.t" uTph eann dt hwea lmka'n? gBoutt uIp waanndt wyeonut thoo mken.o w * * _______________________________________________ dev-servo mailing list dev-servo@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-servo