From mboxrd@z Thu Jan 1 00:00:00 1970 Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Lawrence D'Oliveiro Newsgroups: fr.comp.lang.ada,comp.lang.ada Subject: Re: Canal+ crash Date: Sun, 21 Jul 2024 21:53:46 -0000 (UTC) Organization: A noiseless patient Spider Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Sun, 21 Jul 2024 23:53:47 +0200 (CEST) Injection-Info: dont-email.me; posting-host="c51abaeff06798f1fc5c50999d77d5e4"; logging-data="288476"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/uceVlm5WquQcNnnn2xMN8" User-Agent: Pan/0.158 (Avdiivka; ) Cancel-Lock: sha1:Fjf4apeRTKTwERs2A9Jz7vPXyWQ= Xref: news.eternal-september.org fr.comp.lang.ada:2297 comp.lang.ada:66241 List-Id: On Sun, 21 Jul 2024 11:10:06 +0200, J-P. Rosen wrote: > Le 21/07/2024 à 10:00, Niklas Holsti a écrit : > >> But certainly, most attacks on SW have used functional bugs such as >> buffer overflows. > > A problem that has been solved since 1983, and even before (Pascal had > bounds checking). Sigh... Pascal had no checking for memory leaks or double-frees. Rust certainly seems to be a next-generation solution to these sorts of memory problems.