[rust-dev] Integer overflow, round -2147483648

Patrick Walton pcwalton at mozilla.com
Fri Jun 27 08:58:40 PDT 2014


On 6/27/14 1:31 AM, Igor Bukanov wrote:
> This bug would be harmless in safe code in Rust as exploiting it
> requires array access without bound checking.

Correct. This is a prime example of what I was talking about in my 
earlier message: weaponizing integer overflows is much more difficult in 
a memory-safe language.

Patrick



More information about the Rust-dev mailing list