Linux
Welcome to c/linux!
Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!
Rules:
- 
Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.
 - 
Be respectful: Treat fellow community members with respect and courtesy.
 - 
Quality over quantity: Share informative and thought-provoking content.
 - 
No spam or self-promotion: Avoid excessive self-promotion or spamming.
 - 
No NSFW adult content
 - 
Follow general lemmy guidelines.
 
view the rest of the comments
It is still possible to have security vulnerabilities in Rust
Nobody claimed otherwise.
'Use-after-free' bugs are a specific type of memory access bug that Rust was designed around preventing. It literally refers to trying to access a block of memory after it has already been freed by the memory allocator. Unless you go out of your way to use the "unsafe" keyword in rust (which in most cases, you shouldn't) then this type of bug is not possible.
Utopia or nothing!
That's not what's at issue her LOL