Moral of the story: using Rust will not automatically make your code bug proof. It can actually introduce bugs that are of totally new breed and hard to debug.
I know you're intentionally spinning this as a bad thing, but it's really not.
Instead of worrying about simple and very common classes of bugs that can be solved statically with the help of the compiler, you are free to worry about whatever other non-trivial bugs in your program are remaining.
You're obviously free to waste your own time if you'd like.
I'm not sure I see where the bug here is due to Rust, or of a totally new breed. And the latter half of the blog post notes that it was fixed less than three hours after first being noticed.
Nope - This bug was not caused by the language. Also, no one has ever claimed Rust is perfect. What people are claiming is it is a good alternative to C/C++ which prevents a lot of common errors like buffer overflows.
eigenform|1 year ago
Instead of worrying about simple and very common classes of bugs that can be solved statically with the help of the compiler, you are free to worry about whatever other non-trivial bugs in your program are remaining.
You're obviously free to waste your own time if you'd like.
nemothekid|1 year ago
kibwen|1 year ago
rablackburn|1 year ago
>> (…) it’s a rare case of a kernel memory access check bug that had no security implications.
My favourite type of kernel bug.
StressedDev|1 year ago
toast0|1 year ago