{"id":6933,"date":"2019-12-22T14:33:28","date_gmt":"2019-12-22T22:33:28","guid":{"rendered":"https:\/\/www.ultrasaurus.com\/?p=6933"},"modified":"2019-12-22T16:57:27","modified_gmt":"2019-12-23T00:57:27","slug":"memory-safety-necessary-not-sufficient","status":"publish","type":"post","link":"https:\/\/www.ultrasaurus.com\/2019\/12\/memory-safety-necessary-not-sufficient\/","title":{"rendered":"memory safety: necessary, not sufficient"},"content":{"rendered":"

As I think about developing new Internet-connected software, I worry about the safety of the people who use it. By 2021, most Web browsers won’t allow native code extensions, which will eliminate a lot of potential issues, while a hug swath of creative animations and interactives will disappear from the Web. I spent some time this summer, thinking about what I could learn from the security vulnerabilities in the Flash Player that has been much maligned in recent years.<\/p>\n

Flash CVEs (2001-2009)<\/h2>\n

I looked at the Common Vulnerabilities and Exposure List (CVE List<\/a> hosted by Mitre with all reports 2001-2019. I found 1172 Flash Player vulnerabilities, which sounds huge, but in context of vulnerabilities reported in Web Browsers, doesn’t look that bad:<\/p>\n