Hacker News new | past | comments | ask | show | jobs | submit login

I still question that. It's generally as good as the day it came out. Discovered vulnerabilities are going to be in the language, probably not in the library itself. As long as it's not dependent on a language that's so old it's not getting security fixes, it should be fine.

Actually, a big exception is libraries that have external dependencies that change. A client library for an API, for example. Those can break quickly.




Hm, vulns are more common in libraries in general than in the compiler, I'd say. Or am I misunderstanding?


By "discovered vulnerabilities", I mean a security issue that wasn't known when the library was first written but then came to be known. This is what's fixed when a library is maintained.

This entirely depends on the library, but I just generally don't see a lot of security fixes in library updates. But for compiler updates, I do.

I'm speaking super broadly, and this will be very different for a Python graphing library versus a C networking library.


The vulnerability is almost never in the compiler (not never - I have seen a case, but very rare). Most attacks are in the library itself. If your library has a buffer overflow you are vulnerable. If your library has a C style buffer length + size parameters and you mess them up is it the libraries fault for such a bad API?




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: