Conversation

Those aren't bugs in code written in memory safe Rust. Those are bugs in low-level unsafe code building the safe abstractions. No one is claiming the Rust compiler and standard library are completely free of bugs. That's not what it means for it to be a memory safe language.
1
9
If you look at the details for those bugs, you'll see that these are soundness holes in APIs that are supposed to be safe. For these bugs to actually be exploitable, there would need to be code not just triggering the soundness holes, but in a way that exposes it to an attacker.
1
6
Those bugs demonstrate the need for memory safe languages. They're occurring in the memory unsafe dialect of Rust requiring explicit unsafe blocks and functions. It's important to minimize that trusted memory unsafe code which is pretty much the entire point of the language...
1
6
Rust's standard library, runtime and compiler are written in Rust rather than C. This requires the language to support an unsafe dialect for building the safe abstractions used in the safe language. It's not a surprise that code in a memory unsafe language has memory safety bugs.
1
9
Code is going to have bugs. That's why it's important to write code in a memory safe language where those bugs aren't going to result in memory corruption exploitable for remote code execution. You're only demonstrating why it's useful and important with what you've said / shown.
1