[OffTopic] A vulnerability postmortem on Network Security Services
Steven Schveighoffer
schveiguy at gmail.com
Thu Dec 2 13:19:09 UTC 2021
On 12/2/21 7:15 AM, Johan wrote:
> On Thursday, 2 December 2021 at 11:01:07 UTC, Imperatorn wrote:
>> On Thursday, 2 December 2021 at 08:09:18 UTC, Paulo Pinto wrote:
>>> Google's Project Zero goes through a memory corruption exploit on
>>> Network Security Services, where despite all static analysers,
>>> fuzzers and code reviews, it flew under the radar.
>>>
>>> https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
>>>
>>>
>>> Hence why @safe matters.
>>
>> Bottom line:
>> Use D instead of C 😎
>
> Sorry to rain on the party here, but D is of course not at all immune to
> this problem.
> It was not hard to find out-of-bounds memory access in the D compiler,
> using the fuzz techniques mentioned in the article.
The D compiler is not @safe.
Using D isn't enough, you need to use @safe D.
Even that isn't enough, because most of the time people misuse @trusted
(because it's so easy to misuse).
-Steve
More information about the Digitalmars-d
mailing list