Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CM
Posts
51
Comments
93
Joined
2 yr. ago
BSD @programming.dev
cmeerw @programming.dev
BSD @programming.dev
cmeerw @programming.dev
C++ @programming.dev
cmeerw @programming.dev

How to Secure Existing C and C++ Software without Memory Safety

The most important security benefit of software memory safety is easy to state: for C and C++ software, attackers can exploit most bugs and vulnerabilities to gain full, unfettered control of software behavior, whereas this is not true for most bugs in memory-safe software—just a few

C++ @programming.dev
cmeerw @programming.dev

This is a status update on improvements currently in progress for hardening and securing our C++ software.

BSD @programming.dev
cmeerw @programming.dev
C Programming Language @programming.dev
cmeerw @programming.dev

For the big brain 10,000 meter view, defer ⸺ and the forthcoming TS 25755 ⸺ is a general-purpose block/scope-based “undo” mechanism that allows you to ensure that no matter what happens a set of behavior (statements) are run.

C++ @programming.dev
cmeerw @programming.dev

Bjarne Stroustrup, creator of C++, has issued a call for the C++ community to defend the programming language, which has been shunned by cybersecurity agencies and technical experts in recent years for its memory safety shortcomings.

Emacs @programming.dev
cmeerw @programming.dev

Emacs 30.1 includes security fixes for a shell injection vulnerability in man.el (CVE-2025-1244), and for arbitrary code execution with flymake (CVE-2024-53920). We recommend upgrading immediately.

C Programming Language @programming.dev
cmeerw @programming.dev

Time to make C the COBOL of this century (The Register - Opinion)

There's no perhaps about the FBI and CISA getting snippy at buffer overflows. These people worry about exploits that threaten car-crash incidents in enterprise IT, and they've seen enough to get angry. It's not that making mistakes is a crime when writing code. No human endeavor worth doing is without error. It's more that this class of bug is avoidable, and has been for decades, yet it pours out of big tech like woodworm from a church pew. Enough already, they say. They are right.

  • see https://www.open-std.org/jtc1/sc22/wg21/docs/papers/2024/p3471r2.html#enabling-hardening

    Much like a freestanding implementation, the way to request a hardened implementation is left for the implementation to define. For example, similarly to -ffreestanding, we expect that most toolchains would provide a compiler flag like -fhardened, but other alternatives like a -D_LIBCPP_HARDENING_MODE=

    <mode>

    macro would also be conforming.

  • C++ @programming.dev
    cmeerw @programming.dev

    On Saturday, the ISO C++ committee completed the second-last design meeting of C++26, held in Hagenberg, Austria. There is just one meeting left before the C++26 feature set is finalized in June 2025 and draft C++26 is sent out for its international comment ballot (aka “Committee Draft” or “CD”), and C++26 is on track to be technically finalized two more meetings after that in early 2026.

    C++ @programming.dev
    cmeerw @programming.dev

    It is now 45+ years since C++ was first conceived. As planned, it evolved to meet challenges, but many developers use C++ as if it was still the previous millennium. This is suboptimal from the perspective of ease of expressing ideas, performance, reliability, and maintainability. Here, I present the key concepts on which performant, type safe, and flexible C++ software can be built: resource management, life-time management, error-handling, modularity, and generic programming. At the end, I present ways to ensure that code is contemporary, rather than relying on outdated, unsafe, and hard-to-maintain techniques: guidelines and profiles.

    C++ @programming.dev
    cmeerw @programming.dev

    Contracts for C++ explained in 5 minutes

    With P2900, we propose to add contract assertions to the C++ language. This proposal is in the final stages of wording review before being included in the draft Standard for C++26.

  • Isn't that mainly just torrent trackers that publish your IP address and then the ISP gets a request for who was using that particular IP address. I don't think an ISP would itself be interested in detecting whether their customers download illegal content - there is no business case for them to do that.

  • C++ @programming.dev
    cmeerw @programming.dev

    Full-text search engine for the C++ Working Draft (and older versions from Tim Song's repository)

    BSD @programming.dev
    cmeerw @programming.dev

    NetBSD 10.1 released

    The NetBSD Project is pleased to announce NetBSD 10.1, the first point release of the NetBSD 10 stable branch.

    C++ @programming.dev
    cmeerw @programming.dev

    On Saturday, the ISO C++ committee completed the third-last design meeting of C++26, held in Wrocław, Poland. There are just two meetings left before the C++26 feature freeze in June 2025, and C++26 is on track to be completed two more meetings after that in early 2026. Implementations are closely tracking draft C++26; GCC and Clang already support about two-thirds of C++26 features right now.

    BSD @programming.dev
    cmeerw @programming.dev

    Version 7.6 – the 'OpenBSD of Theseus' – released

    BSD @programming.dev
    cmeerw @programming.dev

    EuroBSDcon 2024 in Dublin, Ireland: some notes after the conference

    C++ @programming.dev
    cmeerw @programming.dev

    The empire of C++ strikes back with Safe C++ blueprint

    C++ @programming.dev
    cmeerw @programming.dev
  • at least you could keep their reviews so users could at least know if the app can be trusted.

    You mean, don't trust a flatpak uploaded by a random person, but if there are enough fake reviews, it can be trusted?

  • C++ @programming.dev
    cmeerw @programming.dev
  • Huh? There is no such alternation between new features and feature freeze releases. In fact, C++26 will very likely get reflection as a major new feature. In comparison, the biggest core language feature in C++23 was probably "deducting this (explicit object member functions)".

    The only thing that keeps Contracts out of C++26 is that they might not be finished in time (they'll need to be handed over from Evolution to Core by the February 2025 meeting, and then make it through Core review during the summer 2025 meeting).

  • There is no reason to “hate” Ubuntu but there are better choices.

    What are those better choices then (for those who currently use the non-LTS Ubuntu releases and don't want to move to rolling releases or LTS-only releases)?

  • I still think Ubuntu is the best option (particularly if you want to use the non-LTS releases)

    Having said that I do hate snaps and also dislike flatpaks. So what I do is just use the Firefox deb package from the PPA and the chromium package from Linux Mint. Oh, and I have actually replaced ubuntu-advantage-tools with a no-op dummy package.