(no title)
IshKebab | 1 day ago
It's a particularly bad one though because it always leads to UB, which means you can't say anything about what happens next.
That's why memory bug severity is often "MAY lead to RCE but who knows". At least with non-UB bugs you can reason about them.
In any case, Rust massively helps with logic bugs too. It's not just about memory safety.
zozbot234|1 day ago
This is also why memory safety is table-stakes when it comes to formal verification of the underlying program logic. You can't solve logic bugs (even where that's known to be feasible, such as for tightly self-contained, library-like features) without solving memory safety first.
nananana9|1 day ago
If you read a language standard and try very hard to forget that the actual computer exists, sure.
If you remember computers are real, you can pretty easily tell what will happen when you write to address 0x00000000 on a CPU with virtual memory.
Tuna-Fish|1 day ago
FartyMcFarter|1 day ago
For example, you can do a double free, or write to a pointer that was freed.
IshKebab|1 day ago
Welcome to acceptance: https://mohitmv.github.io/blog/Shocking-Undefined-Behaviour-...