From mboxrd@z Thu Jan 1 00:00:00 1970 Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Lawrence D'Oliveiro Newsgroups: fr.comp.lang.ada,comp.lang.ada Subject: Re: Canal+ crash Date: Tue, 23 Jul 2024 01:48:12 -0000 (UTC) Organization: A noiseless patient Spider Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Tue, 23 Jul 2024 03:48:12 +0200 (CEST) Injection-Info: dont-email.me; posting-host="e8b75ad8e7aaf8b1a754381faa416e2b"; logging-data="959561"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX197DtP01rfqDyNwgy5xwcLQ" User-Agent: Pan/0.158 (Avdiivka; ) Cancel-Lock: sha1:P9R90UifEc/2qL9ykxgjU/aXtDk= Xref: news.eternal-september.org fr.comp.lang.ada:2301 comp.lang.ada:66245 List-Id: On Mon, 22 Jul 2024 08:36:08 +0200, J-P. Rosen wrote: > Le 21/07/2024 à 23:53, Lawrence D'Oliveiro a écrit : >> On Sun, 21 Jul 2024 11:10:06 +0200, J-P. Rosen wrote: >> >>> Le 21/07/2024 à 10:00, Niklas Holsti a écrit : >>> >>>> But certainly, most attacks on SW have used functional bugs such as >>>> buffer overflows. >>> >>> A problem that has been solved since 1983, and even before (Pascal had >>> bounds checking). Sigh... >> >> Pascal had no checking for memory leaks or double-frees. >> >> Rust certainly seems to be a next-generation solution to these sorts of >> memory problems. > > We were talking about bounds checking, that Pascal had. Which is only one potential pitfall for bugs with security implications.