this post was submitted on 08 May 2025
74 points (92.0% liked)

Linux

54037 readers
1639 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
top 16 comments
sorted by: hot top controversial new old
[–] Mwa@lemm.ee 2 points 7 hours ago (1 children)

I wonder the performance compared to regular sudo

[–] spv@lemmy.spv.sh 4 points 7 hours ago

rust compiles to native code, so barring some horrific implementation issues, i'd bet my money on it being roughly equivalent.

[–] abobla@lemm.ee 45 points 2 days ago (1 children)

This comment seems interesting, it was first question that popped into my head:

[–] atzanteol@sh.itjust.works 22 points 1 day ago (1 children)

That is... A big claim. Yeah, rust minimizes or removes some categories of vulnerabilities. This is true. BUT sudo has been well tested over decades.

[–] Clusterfck@lemmy.sdf.org 4 points 1 day ago (1 children)

I'll be the first to admit to not paying much attention to Linux vulnerabilities, but I agree, I feel like a vulnerability in a package like sudo would have been huge news.

[–] ShortN0te@lemmy.ml 4 points 1 day ago

cve-2021-3156 heap overflow in sudo. roughly 10 years long in sudo. Allowed privilege escalation. It was huge.

[–] danielquinn@lemmy.ca 11 points 1 day ago (3 children)

Is it GPL though? If this is a case of MIT-licensed stuff weaseling its way into Linux core utils, I'm not interested.

[–] 2xsaiko@discuss.tchncs.de 27 points 1 day ago* (last edited 1 day ago) (1 children)

sudo is MIT also (or something that looks like MIT at least). https://www.sudo.ws/about/license/

The more critical part wrt license is real coreutils which they also want to replace.

[–] danielquinn@lemmy.ca 5 points 1 day ago* (last edited 12 hours ago)

This is what I get for posting at 1am. Thanks for the clarification. Yeah I just assumed it was the same situation as coreutils.

[–] naught101@lemmy.world 5 points 1 day ago

Looks like it's dual licenced, MIT and Apache https://github.com/trifectatechfoundation/sudo-rs

[–] mogoh@lemmy.ml 4 points 1 day ago* (last edited 1 day ago) (1 children)

Where is the problem when something mit-licensed is in core utils?

Edit: sudo isn't even a core util.

[–] danielquinn@lemmy.ca 25 points 1 day ago (2 children)

Granted, sudo isn't in coreutils, but it's sufficiently standard that I'd argue that the licence is very relevant to the wider Linux community.

Anyway, I answered this at length the last time this subject came up here, but the TL;DR is that private companies (like Canonical, who owns Ubuntu) love the MIT license because it allows them to take the code and make proprietary versions of it without having to release the source code. Consider the implications of a sudo binary that's Built For Ubuntu™ with closed-source proprietary hooks into Canonical's cloud auth provider. It's death by a thousand MIT-licensed cuts to our once Free operating system.

[–] JubilantJaguar@lemmy.world 4 points 1 day ago

Very useful concrete example of how these changes might be a problem. Thanks.

[–] serenissi@lemmy.world -2 points 1 day ago

What's the problem with it? These MIT programs already exists. Anyone can make proprietary version. Including in Ubuntu doesn't change that.

Also your example is pointless. Canonical would rather make a proprietary pam module instead of a custom internal fork of sudo-rs.

[–] pohart@programming.dev 6 points 1 day ago

I don't know how often exploits that this would prevent are found, but sometimes

[–] ABetterTomorrow@lemm.ee 1 points 1 day ago

Can’t wait to test it out!