Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
70% Of Microsoft Patches Are Memory Fixes
#1
https://www.fudzilla.com/news/pc-hardwar...y-problems
This should come as a surprise to nobody. Read this as well to see more evidence that C/C++ has security issues: https://robert.ocallahan.org/2017/07/con...ammer.html
Quote:Speaking to the assembled throngs at an Israel Security conference, a Microsoft engineer Matt Miller said that memory safety bugs happen when software, accidentally or intentionally, accesses system memory in a way that exceeds its allocated size and memory addresses.

He said that over the the last 12 years, around 70 percent of all Microsoft patches were fixes for memory safety bugs.

The reason for this high percentage is because Windows has been written mostly in C and C++, two "memory-unsafe" programming languages that allow developers fine-grained control of the memory addresses where their code can be executed.
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)