#erlang

See tagged statuses in the local BookWyrm community

- what if everything was a pointer
- what if everything was a linked list
- what if everything was a pure function
- what if everything was a stack
- what if everything was a hash map
- what if everything was immutable
- what if everything was a pattern to match
- what if everything was a class
- what if everything was a memory allocation problem
- what if everything != nil
- what if everything was everything

A critical vulnerability, named BatBadBut, was discovered in the Rust programming language, affecting not just Rust but also Erlang, Go, Python, Ruby, and potentially others. This vulnerability, with a severity score of 10/10, could allow attackers to execute arbitrary commands on Windows systems by exploiting how Rust handles batch files. The issue arises from Rust's standard library improperly escaping arguments when invoking batch files on Windows, leading to potential command injection. The vulnerability has been addressed with a fix in Rust version 1.77.2, which developers are urged to update to. Other programming languages and systems, including Node.js, PHP, and Java, are also affected and are working on patches.

https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/

https://blog.rust-lang.org/2024/04/09/cve-2024-24576.html