Thanks to everyone for the excellent feedback. I've submitted an RFC incorporating many of the ideas from the discussion:
https://github.com/rust-lang/rfcs/pull/146 On Fri, Jun 27, 2014 at 5:58 PM, Patrick Walton <[email protected]> wrote: > On 6/27/14 1:31 AM, Igor Bukanov wrote: > >> This bug would be harmless in safe code in Rust as exploiting it >> requires array access without bound checking. >> > > Correct. This is a prime example of what I was talking about in my earlier > message: weaponizing integer overflows is much more difficult in a > memory-safe language. > > Patrick > > > _______________________________________________ > Rust-dev mailing list > [email protected] > https://mail.mozilla.org/listinfo/rust-dev >
_______________________________________________ Rust-dev mailing list [email protected] https://mail.mozilla.org/listinfo/rust-dev
