[Not really OT] Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language.

Timon Gehr timon.gehr at gmx.ch
Thu Jul 25 19:36:13 UTC 2024


On 7/25/24 19:09, Walter Bright wrote:
> How can Rust be safe

Rust is indeed a memory-unsafe language. Yet better memory safety is one 
of its key features.

Rust had its share of controversy over popular libraries with memory 
safety bugs. However, those were unintentional.

Also:

https://github.com/rust-lang/rust/labels/I-unsound
https://github.com/rust-lang/rust/issues/25860 (open since 2015)
https://github.com/Speykious/cve-rs

> if programmers can just slap on the "unsafe" attribute?
> 

(The "unsafe" attribute is not a memory safety problem. Lack of the 
"unsafe" attribute on a function with a memory-unsafe interface is.)

It's a question of the community culture. Do Rust programmers _actually_ 
put "unsafe" blocks everywhere, carelessly? This is exactly what this is 
about.

I am taking issue with throwing overboard even the aspiration of memory 
safety. You won't get D widely recognized as a safer language if its 
ecosystem is actively encouraged to build on careless `@trusted` 
slapping-on, even on functions where it is completely obvious that they 
have an unsafe interface.


More information about the Digitalmars-d mailing list