From: invalid@invalid.invalid   
      
   c186282 writes:   
   > On 2/4/26 03:24, Richard Kettlewell wrote:   
   >> c186282 writes:   
   >>> Being able to pass pointers back and forth is a strong point with   
   >>> 'C'. In theory this COULD be exploited by evil actors, but I can't   
   >>> find any clear doc on whether it's been done to any relevant degree.   
   >> Yes, constantly and for many decades now. Have a look through CVE   
   >> databases or follow a list like oss-security and you’ll see a steady   
   >> stream of vulnerabilities arising from C’s lack of memory safety.   
   >   
   > I'll check.   
   >   
   > However is the 'safety' problem INHERENT to 'C' or related to lazy   
   > shortcuts by people developing apps ?   
      
   In principle you can avoid all the sharp edges and write a perfectly   
   correct C program, just like in principle the guy driving at 100mph down   
   the motorway weaving in and out of the traffic can avoid a collision. In   
   practice, human fallibility wins out sooner or later.   
      
   The people arguing that it’s all just about lazy and incompetent   
   programmers often respond with denial when you highlight some of the   
   language’s stranger characteristics, so they certainly aren’t going to   
   get it right 100% of the time. I think C is a sacred cow for them.   
      
   --   
   https://www.greenend.org.uk/rjk/   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   
|