Skip to main content

Many Lung Cancers Are Now in Nonsmokers. Scientists Want to Know Why.

1 month ago
Roughly 10 to 25% of lung cancers worldwide now occur in people who have never smoked, according to researchers at the National Cancer Institute. Among certain groups of Asian and Asian American women, that share reaches 50% or more. Scientists studying 871 nonsmokers with lung cancer from around the world found that certain DNA mutations were significantly more common in people living in areas with high air pollution levels, including Hong Kong, Taiwan and Uzbekistan. The research, published in Nature this month, revealed that pollution both directly damages DNA and causes cells to divide more rapidly. The biology of cancer in nonsmokers differs from smoking-related cases and may require different prevention and detection strategies. Nonsmokers with lung cancer are more likely to have specific "driver" mutations that can cause cancer, while smokers tend to accumulate many mutations over time. Current U.S. screening guidelines recommend routine testing only for people ages 50 to 80 who smoked at least one pack daily for 20 years. Taiwan now offers screening for nonsmokers with family history after a nationwide trial detected cancer in 2.6% of participants.

Read more of this story at Slashdot.

msmash

Fortifying Ubuntu’s Root with sudo‑rs: How Rust Reinforces Privilege Escalation

1 month ago
by George Whittaker Introduction

Privilege escalation in Linux has always walked a tightrope between convenience and risk. sudo allows users to perform tasks as root without sharing the root password—intuitive, powerful—but also a high-value target for exploits rooted in memory safety bugs. Ubuntu is now pioneering a transition: replacing the traditional C-based sudo with sudo‑rs, a Rust-powered rewrite engineered for safer root handling.

Understanding sudo‑rs

Built under the Trifecta Tech Foundation’s “Privilege Boundary” initiative, sudo‑rs is a from-scratch implementation of sudo and su created in Rust, a language celebrated for its compile-time guarantees against memory mishaps. Designed to behave like the classic “sudo,” it supports user prompts, permission checks, and environment handling, but keeps underlying behavior Turing-equivalent.

Why Ubuntu Is Betting on Rust

Rust’s strict approach to memory usage eradicates whole classes of vulnerabilities—like buffer overflows and use-after-free—that have long plagued system tools. For a utility as privileged as sudo, these protections offer exponentially greater security value. Ubuntu’s strategy, dubbed “Carefully But Purposefully Oxidising Ubuntu,” is a methodical shift toward memory-safe tooling.

Transitioning in Ubuntu 25.10 and Beyond

Canonical has announced that Ubuntu 25.10 (“Questing Quokka”), scheduled for October 9, 2025, will ship sudo‑rs as the default /usr/bin/sudo. This serves as a proving ground ahead of Ubuntu 26.04 LTS (April 2026). Regular users will find no change—commands, flags, and password prompts remain familiar—while Ubuntu monitors real-world feedback.

Ensuring Compatibility

To deliver a smooth switch, Canonical is funding “Milestone 5” development in sudo‑rs to implement:

  • NOEXEC for shell escape control,

  • AppArmor integration,

  • sudoedit,

  • Support for kernels older than 5.9 (critical for Ubuntu 20.04 containers).

A “less‑is‑more” philosophy guides, meaning legacy niche features—like LDAP-based sudoers—might remain absent. But, for most workflows, sudo‑rs should cover every essential feature.

Coexistence and Rollback

Ubuntu’s old sudo will still be available in the repositories and can be reselected via the alternatives system. Users needing features not yet ported to sudo‑rs can effortlessly revert.

Go to Full Article
George Whittaker