▲ | jstarks 5 days ago | ||||||||||||||||||||||||||||||||||||||||||||||||||||
> If you want to claim that a language is memory-unsafe, POC || GTFO. There's a POC right in the post, demonstrating type confusion due to a torn read of a fat pointer. I think it could have just as easily been an out-of-bounds write via a torn read of a slice. I don't see how you can seriously call this memory safe, even by a conservative definition. Did you mean POC against a real program? Is that your bar? | |||||||||||||||||||||||||||||||||||||||||||||||||||||
▲ | tptacek 5 days ago | parent [-] | ||||||||||||||||||||||||||||||||||||||||||||||||||||
You need a non-contrived example of a memory-corrupting data race that gives attackers the ability to control memory, through type confusion or a memory lifecycle bug or something like it. You don't have to write the exploit but you have to be able to tell the story of how the exploit would actually work --- "I ran this code and it segfaulted" is not enough. It isn't even enough for C code! | |||||||||||||||||||||||||||||||||||||||||||||||||||||
|