• ZoteTheMighty@lemmy.zip
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      13 hours ago

      For package maintainers, it’s reasonable to expect security updates are rolled out the same week that a vulnerability is found. If you can’t deploy a new version of a package in 6 months, not maintaining the package is also a valid option.

    • undu@discuss.tchncs.de
      link
      fedilink
      arrow-up
      48
      arrow-down
      2
      ·
      1 day ago

      There’s time until March for the maintainers of the 3 niche architectures to organize and make rust available for them. Doesn’t sound that abrupt to me

    • whoever loves Digit@piefed.social
      link
      fedilink
      English
      arrow-up
      18
      arrow-down
      7
      ·
      edit-2
      1 day ago

      Rust adds another layer of trusting the compiler isn’t backdoored. All UNIX/Linux systems use the gcc toolchain, so having it written in C would mean less dependencies for the OS.

      Strange times.

      • aubeynarf@lemmynsfw.com
        link
        fedilink
        arrow-up
        33
        arrow-down
        3
        ·
        edit-2
        1 day ago

        how many compiler back doors have we seen versus use-after-free/stack overflow attacks?

        The anti-Rust crowd baffles me. Maybe C++ has rotted their brain to the point they can’t “get” the borrow checker.

        My only complaint is that its syntax is an ugly mishmash. Should have copied scala or f#

        • Shanmugha@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          21
          ·
          20 hours ago

          More like Rust has rotted someone’s brain. “Hey, I can’t code safely, so I will use this new toy that is supposed to make me”. This line of thought is OK as long as it does not get imposed on anything I do as a programmer

        • whoever loves Digit@piefed.social
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          23
          ·
          edit-2
          22 hours ago

          Strange how your bad faith reply is still here, and with many upvotes, while my reply calling you out appears to be gone.

          This is an example of how discussions like this are more appropriate for nostr, where there are no bans / post removals.

        • whoever loves Digit@piefed.social
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          46
          ·
          edit-2
          1 day ago

          how many compiler back doors have we seen versus use-after-free/stack overflow attacks?

          Who cares? Why do you ask?

          The anti-Rust crowd baffles me. Maybe C++ has rotted their brain to the point they can’t “get” the borrow checker.

          I can’t code, so C++ doesn’t have much space in my brain, but Rust still seems a lot more sus to me than C.

          • 4am@lemmy.zip
            link
            fedilink
            arrow-up
            25
            arrow-down
            1
            ·
            1 day ago

            Rust seems sus to you? What’s that based on, “vibes, bro”?

            • whoever loves Digit@piefed.social
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              25
              ·
              edit-2
              24 hours ago

              Essentially, yeah.

              Noticed an overall “vibe” where Rust critics repeatedly have points that sound like they make sense, and I can’t really think of examples of them saying confusing nonsense, or refusing to elaborate on a point when challenged to. Whereas, other way around for Rust defenders.

              Best way I know to determine what’s “sus” is to look at what’s defended by people who are willing to elaborate on the points you ask them to elaborate on. It’s almost a perfect gauge. But maybe not quite perfect, and you could totally call it “vibes.” I remain not totally certain about Rust.

              • jasory@programming.dev
                link
                fedilink
                arrow-up
                9
                ·
                15 hours ago

                It’s very hard to get a good look at which arguments are good or not without having the experience to evaluate them.

                Here’s my view on Rust vs C or C++. Rust is a stricter language which makes it easier to code with low run-time errors, which is great for writing large scale projects. Now the problem with this is that you can write C++ to also be strict but it’s a lot more verbose than the standard approach, so most developers don’t. This causes disagreement among Rustaceans and C/C++'ers. The C++'ers are correct that you can replicate anything in Rust in C++. A correct program is a correct program regardless of the language it’s written in. Rustaceans also oversell when it comes to program correctness, tons of Rust programs have errors; Rust can help minimize errors but it’s not a silver bullet. Rewriting-in-Rust for an already good program is a fools errand; the outcome will probably be a worse program. However Rustaceans are correct in pointing out that the C++ written programs tend to have more errors, it’s just not the rule they pretend it is.

                In summary, Rust is a great language but Rustaceans oversell it. Many of it’s apparent advantages can be mitigated by good development practice. It’s just that good practices are difficult and uncommon.

                (Note that there are also 3-rd party tools like static analysers, which can help developers detect errors. So again Rust is better out of the box, but ultimately you can get the same outcome with some work).

              • BlameTheAntifa@lemmy.world
                link
                fedilink
                arrow-up
                14
                ·
                20 hours ago

                If you are not a programmer, you do not have the background or understanding to assess any arguments about a programing language.

                The vast majority of anti-Rust people are stubborn and toxic types who don’t know it and refuse to learn. On the other end you have those who do use it, know why it’s such a good language, and criticize it constructively so that it continues to improve. Rust lacks many quality of life features that other languages have, but that is by design. It’s meant to create rock-solid software and forces you to think about things like lifetimes and ownership scopes that other languages let you take for granted.

                You can’t easily move from languages like C++ or Python to Rust without learning and accepting new concepts and patterns. If someone can’t or won’t do that, they should not be doing any programming.

          • aubeynarf@lemmynsfw.com
            link
            fedilink
            arrow-up
            22
            ·
            edit-2
            1 day ago

            You care, you are the one that brought it up as an issue with rust.

            I ask as a rhetorical question to shed light on the fact that compiler back doors are a vanishingly small fraction of total security exploits, while the memory bugs that rust specifically addresses make up the vast majority.

            • whoever loves Digit@piefed.social
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              27
              ·
              1 day ago

              You care

              About random numbers? Not really

              you are the one that brought it up as an issue with rust.

              Are you referring to where I said “I want to know some random numbers Rust isn’t giving me, and that’s a problem with Rust?”

              Because that was in your imagination.

              Or are you referring to where I said “Rust wants to know some random numbers it isn’t giving itself?”

              Because that was also in your imagination.

              In reality, I brought up that I’ve heard Rust adds another layer of trusting the compiler isn’t backdoored.

              • aubeynarf@lemmynsfw.com
                link
                fedilink
                arrow-up
                14
                arrow-down
                1
                ·
                1 day ago

                While you’re spouting nonsense, this is happening:

                https://www.infoq.com/news/2025/11/redis-vulnerability-redishell/

                The vulnerability exploits a 13-year-old UAF memory corruption bug in Redis, allowing a post-auth attacker to send a crafted Lua script to escape the default Lua sandbox and execute arbitrary native code. This grants full host access, enabling data theft, wiping, encryption, resource hijacking, and lateral movement within cloud environments.

                13 years. That’s how long it took to find a critical safety vulnerability in one of the most popular C open source codebases, Redis. This is software that was expertly written by some of the best engineers in the world and yet, mistakes can still happen! It’s just that in C a “mistake” can often mean a memory-safety bug that would put user data at risk (…) That’s the nature of memory-safety bugs in C: they can hide in plain sight.

                • Shanmugha@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  arrow-down
                  7
                  ·
                  20 hours ago

                  And while you bring up a “boo-hoo, software written in C has bugs” common knowledge, to my best knowledge standard Rust library still has unsafe parts. But that’s no problem, because contracts, sure. Thanks for demonstrating how full of nonsense you are, bye

                  • aubeynarf@lemmynsfw.com
                    link
                    fedilink
                    arrow-up
                    6
                    arrow-down
                    1
                    ·
                    20 hours ago

                    it’s weird how often these same strawman arguments are the response when Rust’s safety advantage over C comes up. Usually the same adolescent tone too.

                • whoever loves Digit@piefed.social
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  18
                  ·
                  edit-2
                  1 day ago

                  While you’re spouting nonsense

                  I’m the guy you were replying to here. I’m not spouting any nonsense in this thread. Did you reply to the wrong person, or is this a false accusation?

                  this is happening:

                  https://www.infoq.com/news/2025/11/redis-vulnerability-redishell/

                  The vulnerability exploits a 13-year-old UAF memory corruption bug in Redis, allowing a post-auth attacker to send a crafted Lua script to escape the default Lua sandbox and execute arbitrary native code. This grants full host access, enabling data theft, wiping, encryption, resource hijacking, and lateral movement within cloud environments.

                  13 years. That’s how long it took to find a critical safety vulnerability in one of the most popular C open source codebases, Redis. This is software that was expertly written by some of the best engineers in the world and yet, mistakes can still happen! It’s just that in C a “mistake” can often mean a memory-safety bug that would put user data at risk (…) That’s the nature of memory-safety bugs in C: they can hide in plain sight.

                  Why did you make me read these paragraphs without explaining how they connect to the context? Let me guess: they don’t connect to the context, you’re just designing your replies to mislead people dumb enough to be vulnerable to your manipulation tactics? With no consideration for me whose time/energy you’re wasting, much less them who you’re confusing?