[Not really OT] Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language.
Walter Bright
newshound2 at digitalmars.com
Thu Jul 25 06:31:39 UTC 2024
On 7/24/2024 7:24 PM, Richard (Rikki) Andrew Cattermole wrote:
> You have almost got it.
>
> It is not any language with that capability, it is any language with that
> capability that does not force you to check for null before the dereference.
Checking for null won't save you, as there are 4 billion addresses for a 32 bit
pointer, some will seg fault, and some will overwrite your program's data with
garbage.
More information about the Digitalmars-d
mailing list