This vulnerability, hidden within the netfilter: nf_tables component, allows local attackers to escalate their privileges and potentially deploy ransomware, which could severely disrupt enterprise systems worldwide.

  • turdas@suppo.fi
    link
    fedilink
    English
    arrow-up
    1
    ·
    20 hours ago

    If you follow modern C++ best practices, memory unsafety will not happen by accident. The dodgy stuff in modern, idiomatic C++ is immediately obvious.

    • sp3ctr4l@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      19 hours ago

      Yes but the whole point is that Rust forces you to do this.

      Not everybody follows best practices, sometimes people who say they do, well they make mistakes.

      I really don’t understand how this is conceptually difficult to grasp.

      • turdas@suppo.fi
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        18 hours ago

        Rust forces you to do this until you have to use unsafe, after which it doesn’t. That is not so different from C++ guaranteeing your safety until you start using raw pointers.

        It is not the compiler’s job to stop the programmer from shooting themselves in the foot if they want to. It’s the compiler’s job to make it clear to the programmer when they disable the safety, put their finger on the trigger and aim the gun at their foot. Modern C++ does this, and if you still inadvertedly shoot yourself in the foot in spite of the warnings, you brought it on yourself.

        Regular old C, on the other hand, gives you a 9mm when you’re in grade 7, safety: always off.