← Back to context

Comment by fourthark

5 hours ago

Does it fix the security flaws that caused the original project to be shut down?

Because it was written in C, libxml2's CVE history has been dominated by use-after-free, buffer overflows, double frees, and type confusion. xmloxide is written in pure Rust, so these entire vulnerability classes are eliminated at compile time.

  • Only if it doesn’t use any unsafe code, which I don’t think is the case here.

    • Is that true? I thought if you compiled a rust crate with, `#[deny(unsafe_code)]`, there would not be any issues. xmloxide has unsafe usage only in the the C FFI layer, so the rest of the system should be fine.

If by flaws you mean the security researchers spamming libxml2 with low effort stuff demanding a CVE for each one so they can brag about it – no, I don’t think anybody can fix that.

  • Based on context, i kind of imagine they are more thinking of the issues surounding libxslt.