• TechNom (nobody)@programming.dev
    link
    fedilink
    English
    arrow-up
    8
    ·
    5 months ago

    I don’t think that rust would have prevented this one, since this isn’t a compile time error (for the code loader).The address dereferencing would have been inside an unsafe block. What was missing was a validity check of the CI build artifacts and payload check on the client side.

    I do however, think that the ‘fingers-crossed’ approach to memory safety in C and C++ must stop. Rust is a great fit for this use case.

    • Valmond@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      5 months ago

      Well, modern c++ with smartpointers is quite good IMO.

      C on the ither hand is like swimming with sharks, with a nosebleed.