Bugs Rust won't catch

(corrode.dev)

93 points | by lwhsiao 3 hours ago

14 comments

  • collinfunk 50 minutes ago
    Hi, I am one of the maintainers of GNU Coreutils. Thanks for the article, it covers some interesting topics. In the little Rust that I have used, I have felt that it is far too easy to write TOCTOU races using std::fs. I hope the standard library gets an API similar to openat eventually.

    I just want to mention that I disagree with the section titled "Rule: Resolve Paths Before Comparing Them". Generally, it is better to make calls to fstat and compare the st_dev and st_ino. However, that was mentioned in the article. A side effect that seems less often considered is the performance impact. Here is an example in practice:

      $ mkdir -p $(yes a/ | head -n $((32 * 1024)) | tr -d '\n')
      $ while cd $(yes a/ | head -n 1024 | tr -d '\n'); do :; done 2>/dev/null
      $ echo a > file
      $ time cp file copy
    
      real 0m0.010s
      user 0m0.002s
      sys 0m0.003s
      $ time uu_cp file copy
    
      real 0m12.857s
      user 0m0.064s
      sys 0m12.702s
    
    I know people are very unlikely to do something like that in real life. However, GNU software tends to work very hard to avoid arbitrary limits [1].

    Also, the larger point still stands, but the article says "The Rust rewrite has shipped zero of these [memory saftey bugs], over a comparable window of activity." However, this is not true [2]. :)

    [1] https://www.gnu.org/prep/standards/standards.html#Semantics [2] https://github.com/advisories/GHSA-w9vv-q986-vj7x

    • s20n 34 minutes ago
      Sorry, complete noob here. Why didn't you just cd into $(yes a/ | head -n $((32 * 1024)) | tr -d '\n')? Why do you need to use the while loop for cd?

      EDIT: got it. -bash: cd: a/a/a/....../a/a/: File name too long

      • collinfunk 22 minutes ago
        No need to apologize at all. Doing it in one cd invocation would fail since the file name is longer than PATH_MAX. In that case passing it to a system call would fail with errno set to ENAMETOOLONG.

        You could probably make the loop more efficient, but it works good enough. Also, some shells don't allow you to enter directories that deep entirely. It doesn't work on mksh, for example.

  • wahern 1 hour ago
    > What’s notable is that all of these bugs landed in a production Rust codebase, written by people who knew what they were doing

    They knew how to write Rust, but clearly weren't sufficiently experienced with Unix APIs, semantics, and pitfalls. Most of those mistakes are exceedingly amateur from the perspective of long-time GNU coreutils (or BSD or Solaris base) developers, issues that were identified and largely hashed out decades ago, notwithstanding the continued long tail of fixes--mostly just a trickle these days--to the old codebases.

    • nine_k 47 minutes ago
      More than that: it seems that Rust stdlib nudges the developer towards using neat APIs at an incorrect level of abstraction, like path-based instead of handle-based file operations. I hope I'm wrong.
      • NobodyNada 1 minute ago
        Nearly every available filesystem API in Rust's stdlib maps one-to-one with a Unix syscall (see Rust's std::fs module [0] for reference -- for example, the `File` struct is just a wrapper around a file descriptor, and its associated methods are essentially just the syscalls you can perform on file descriptors). The only exceptions are a few helper functions like `read_to_string` or `create_dir_all` that perform slightly higher-level operations.

        And, yeah, the Unix syscalls are very prone to mistakes like this. For example, Unix's `rename` syscall takes two paths as arguments; you can't rename a file by handle; and so Rust has a `rename` function that takes two paths rather than an associated function on a `File`. Rust exposes path-based APIs where Unix exposes path-based APIs, and file-handle-based APIs where Unix exposes file-handle-based APIs.

        So I agree that Rust's stdilb is somewhat mistake prone; not so much because it's being opinionated and "nudg[ing] the developer towards using neat APIs", but because it's so low-level that it's not offering much "safety" in filesystem access over raw syscalls beyond ensuring that you didn't write a buffer overflow.

        [0]: https://doc.rust-lang.org/std/fs/index.html

    • slopinthebag 24 minutes ago
      Seems pretty impressive they rewrote the coreutils in a new language, with so little Unix experience, and managed to do such a good job with very little bugs or vulns. I would have expected an order of magnitude more at least.

      Shows how good Rust is, that even inexperienced Unix devs can write stuff like this and make almost no mistakes.

      • nine_k 11 minutes ago
        Yes, it's the lack of Unix experience that's terrifying. So many of mistakes listed are rookie mistakes, like not propagating the most severe errors, or the `kill -1` thing. Why were people who apparently did not have much experience using coreutils assigned to rewrite coreutils?
    • AlotOfReading 44 minutes ago
      Someone once coined a related term, "disassembler rage". It's the idea that every mistake looks amateur when examined closely enough. Comes from people sitting in a disassembler and raging the high level programmers who had the gall to e.g. use conditionals instead of a switch statement inside a function call a hundred frames deep.

      We're looking solely at the few things they got wrong, and not the thousands of correct lines around them.

      • irishcoffee 28 minutes ago
        When I read the article I came away with the impression that shipping bugs this severe in a rewrite of utils used by hundreds of millions of people daily (hourly?) isn’t ok. I don’t think brushing the bad parts off with “most of the code was really good!” is a fair way to look at this.

        Cloudflare crashed a chunk of the internet with a rust app a month or so ago, deploying a bad config file iirc.

        Rust isn’t a panacea, it’s a programming language. It’s ok that it’s flawed, all languages are.

  • hombre_fatal 9 minutes ago
    One thing that's hard about rewriting code is that the original code was transformed incrementally over time in response to real world issues only found in production.

    The code gets silently encumbered with those lessons, and unless they are documented, there's a lot of hidden work that needs to be done before you actually reach parity.

    TFA is a good list of this exact sort of thing.

  • fschuett 11 minutes ago
    Thanks for the list. I like these lists, so I can put them into a .md file, then launch "one agent per file" on my codebase and see if they can find anything similar to the mentioned CVEs.

    Rust won't catch it, but now the agents will.

  • 9fwfj9r 12 minutes ago
    So it's basically failing on - necessary atomicity for filesystem operation - annoying path & string encoding - inertia for historical behaviors
  • jolt42 57 minutes ago
    I wonder if Rust becomes more popular with AI as Rust can help catch what AI misses, but then if that's the case then what about Haskell, or Lean, or?
  • micheles 17 minutes ago
    > uutils now runs the upstream GNU coreutils test suite against itself in CI. That’s the right scale of defense for this class of bug. That's the minimum, it is absurd that they did not start from that!
  • slopinthebag 16 minutes ago
    I kind of find it funny how people will criticise Rust for not preventing all bugs, when the alternative languages don't prevent those same bugs nor the bugs rust does catch. If you're comparing Rust to a perfect language that doesn't exist, you should probably also compare your alternative to that perfect language as well right?

    I'd be interested in a comparison with the amount of bugs and CVE's in GNU coreutils at the start of its lifetime, and compare it with this rewrite. Might be enlightening.

  • rvz 20 minutes ago
    This is what happens when many people hype about a technology that solves a specific class of vulnerabilities, but it is not designed to prevent the others such as logic errors because of human / AI error.

    Granted, the uutils authors are well experienced in Rust, but it is not enough for a large-scale rewrite like this and you can't assume that it's "secure" because of memory safety.

    In this case, this post tells us that Unix itself has thousands of gotchas and re-implementing the coreutils in Rust is not a silver bullet and even the bugs Unix has are part of the specification, and can be later to be revealed as vulnerabilities in reality.

  • Analemma_ 47 minutes ago
    I know nobody's perfect and I'm not asking for perfection, but these bugs are pretty alarming? It seems like these supposed coreutils replacements are being written by people who don't know anything about Unix, and also didn't even bother looking at the GNU tools they are trying to replace. Or at least didn't have any curiosity about why the GNU tools work the way they do. Otherwise they might've wondered about why things operate on bytes and file descriptors instead of strings and paths.

    I hate to armchair general, but I clicked on this article expecting subtle race conditions or tricky ambiguous corners of the POSIX standard, and instead found that it seems to be amateur hour in uutils.

    • lelanthran 40 minutes ago
      > It seems like these supposed coreutils replacements are being written by people who don't know anything about Unix, and also didn't even bother looking at the GNU tools they were supposed to be replacing.

      They're a group of people who want to replace pro-user software (GPL) with pro-business software (MIT).

      I don't really want them to achieve their goal.

    • ronjakoi 3 minutes ago
      They are deliberately not looking at coreutils code because the Rust versions are released as MIT and they don't want the project contaminated by GPL. I am not fond of this, personally.
  • SpectreHat 10 minutes ago
    [dead]
  • marsven_422 54 minutes ago
    [dead]
  • Scarbutt 53 minutes ago
    But Google told us Rust can only have 0.2 vulnerabilities per million lines of code.
  • tokyobreakfast 28 minutes ago
    Is anyone keeping score on the number of bugs Rust introduces when naïve dipshits rewrite perfectly-working software in Rust, introducing logic bugs in the process?