Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I wonder if their efforts to leverage modern chip capabilities to address memory safety (e.g: ARM memory tagging) contributed to that drop of memory safety vulnerabilities



Those technologies don't prevent vulnerabilities they prevent (or raise the cost of) exploitation.


Looked this up as it's new to me. Seems interesting but not far enough, if you configure it to crash the system on an error for dev only, you aren't going to spot the hard to reach cases which are usually the target of these attacks, and having it set to crash on the release build is likely going to be seen as unacceptable.

Something like Rust which can ahead of time verify that these issues aren't present is a better solution imo. Maybe then we can use this as a last resort check that the usages of unsafe didn't cause issues.


Solaris SPARC has been using them for a decade now.

https://docs.oracle.com/cd/E88353_01/html/E37853/adi-7.html


These technologies are intended for production use. It’s most of the reason why you’d want them in the hardware itself, because it drives the performance impact down.


It helps along with the other (software) tooling that exists to improve the safety story for existing C and C++ code. However, it does not eliminate these issues.


Lowers the severity of these issues tho.


Sometimes.


Those aren't or haven't been available long enough to have a significant effect, I suspect.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: