[Not really OT] Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language.

Walter Bright newshound2 at digitalmars.com
Thu Jul 25 06:31:39 UTC 2024


On 7/24/2024 7:24 PM, Richard (Rikki) Andrew Cattermole wrote:
> You have almost got it.
> 
> It is not any language with that capability, it is any language with that 
> capability that does not force you to check for null before the dereference.

Checking for null won't save you, as there are 4 billion addresses for a 32 bit 
pointer, some will seg fault, and some will overwrite your program's data with 
garbage.



More information about the Digitalmars-d mailing list