[Not really OT] Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language.

Richard (Rikki) Andrew Cattermole richard at cattermole.co.nz
Thu Jul 25 19:07:44 UTC 2024


On 26/07/2024 7:00 AM, H. S. Teoh wrote:
> Another factor is, push updates are evil. What really ought to have
> happened is that an update notification should have been sent, and the
> admins should have approved it before it was actually installed. (After
> testing the patch in a controlled environment, before pushing it out to
> live systems.) But I'm probably barking up the wrong tree here... people
> these days are all gung-ho about fully unattended upgrades and fully
> automated everything, who needs anybody to check the sanity of an
> upgrade.  Well, we're staring at the consequences of this attitude right
> now.

You are indeed barking up the wrong tree.

I am already convinced that there was multiple failures went on.

I was able to determine them just from the failures I was seeing on 
Twitter a few hours in.

But, I can't solve those.

I can however solve forcing a D user to check for nullability, and if 
that is the best that we can do, then that's all we can do.



More information about the Digitalmars-d mailing list