Thanks to everyone for the excellent feedback. I've submitted an RFC incorporating many of the ideas from the discussion:
https://github.com/rust-lang/rfcs/pull/146 On Fri, Jun 27, 2014 at 5:58 PM, Patrick Walton <pcwal...@mozilla.com> wrote: > On 6/27/14 1:31 AM, Igor Bukanov wrote: > >> This bug would be harmless in safe code in Rust as exploiting it >> requires array access without bound checking. >> > > Correct. This is a prime example of what I was talking about in my earlier > message: weaponizing integer overflows is much more difficult in a > memory-safe language. > > Patrick > > > _______________________________________________ > Rust-dev mailing list > Rust-dev@mozilla.org > https://mail.mozilla.org/listinfo/rust-dev >
_______________________________________________ Rust-dev mailing list Rust-dev@mozilla.org https://mail.mozilla.org/listinfo/rust-dev