TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Zed Shaw rant on Ruby Vulnerabilities

26 pointsby kevTheDevalmost 17 years ago

4 comments

tptacekalmost 17 years ago
So, I read this, and I think, "it is surprising that Zed Shaw doesn't know what a buffer overflow is". For instance, his "extensions" "overflow" is a case where 2-3 character strings are "overflowing" a MAXPATHLEN buffer.<p>Favorite quote: "Seems like there’s some changes here to determine correct stack direction on the native CPU. Why, that could be a stack smash exploit in the making!" You go, Zed.<p>Two tips:<p>1. It's Ruby. Go write the exploit. If you think it's the patch to bignum (where the offset you're looking at only controls a load, not a store), write the testcase and prove it.<p>2. Read the code, not the diffs.
评论 #223807 未加载
评论 #224054 未加载
ljlolelalmost 17 years ago
For those who don't know, Zed Shaw is famous for 1. creating mongrel among other things; he's a good programmer 2. his rant against some rails leaders: <a href="http://www.zedshaw.com/rants/rails_is_a_ghetto.html" rel="nofollow">http://www.zedshaw.com/rants/rails_is_a_ghetto.html</a> .<p>His rants are hilariously inflammatory (although this one about the vulnerabilities isn't particularly fiery).<p>It should be noted, however, that he's not crazy. I hear he's actually a pretty nice guy in person.<p>""" If you haven’t noticed, I’m funny and enjoy having fun. Enjoy my site, tell me if you use my projects. Don’t take it too seriously though, it’s all an act. """ - <a href="http://www.zedshaw.com/index.html" rel="nofollow">http://www.zedshaw.com/index.html</a>
demallienalmost 17 years ago
It's Zed Shaw, so who cares?<p>I mean, honestly, the writing is so bad that I can't even grasp what he is getting so excited about. Is it because someone just introduced a bunch of vulnerabilities into the MRI? Is it because someone just fixed a bunch of potential security flaws? that's what it looks like in the code, but then I don't get it, what's so bad about fixing bugs??? I think he's trying to say that there is some secret juju going on, where special people get to find this stuff out before others, but Zed never actually gets around to explain why he feels that this is the case - it is after all open source, and everyone has access to it.<p>Or maybe he feels that the fact that there was a delay of a couple of days between the patches going live, and the actual announcement. Oh noes! It's the end of the world! Quick, sue somebody!<p>Anyway, I've wasted too much time on this post as it is. Zed Shaw may actually be a brilliant programmer, but considering his complete inability to be more coherent than a Markhov chain generator, I'll never know it.
dfrankealmost 17 years ago
I already posted this in the thread for the first article about this, but since it was already off the front page: none of the Linux distributions have released fixes for this yet, so I rolled my own for etch. <a href="http://dfranke.us/rubyfix.txt" rel="nofollow">http://dfranke.us/rubyfix.txt</a>