7 'healthy' food myths that actually cause more harm than good, according to a nutritionist
Liquid star Eamon Downes dies aged 56: Tributes pour in as rave pioneer behind club anthem Sweet Harmony loses five year cancer battle
Has Pamela Anderson and Liam Neeson's movie romance spilled into real life? The 'sexy' comments, 'hot' scenes and racy photos that have set tongues wagging - and made an intimacy co-ordinator flee the room
The hidden detail in Prince George's charming 12th birthday portrait that shows just how close he is to his sister Princess Charlotte
Putin's 'dark destroyer' factory: Inside 'world's biggest drone plant' in Russia where army of teens make kamikaze killing machines to unleash on Ukraine
Air India plane skids off runway as three tyres burst on landing at Mumbai
Felix Baumgartner's cause of death revealed after famed daredevil's paraglider crashed down into Italian resort - as report claims freak mid-air accident triggered plunge
Brits in Benidorm are warned to be on guard for heartless charity con as local reveals trick scammers use to strip tourists of their holiday money
Many Lung Cancers Are Now in Nonsmokers. Scientists Want to Know Why.
Read more of this story at Slashdot.
Fortifying Ubuntu’s Root with sudo‑rs: How Rust Reinforces Privilege Escalation
Privilege escalation in Linux has always walked a tightrope between convenience and risk. sudo allows users to perform tasks as root without sharing the root password—intuitive, powerful—but also a high-value target for exploits rooted in memory safety bugs. Ubuntu is now pioneering a transition: replacing the traditional C-based sudo with sudo‑rs, a Rust-powered rewrite engineered for safer root handling.
Understanding sudo‑rsBuilt under the Trifecta Tech Foundation’s “Privilege Boundary” initiative, sudo‑rs is a from-scratch implementation of sudo and su created in Rust, a language celebrated for its compile-time guarantees against memory mishaps. Designed to behave like the classic “sudo,” it supports user prompts, permission checks, and environment handling, but keeps underlying behavior Turing-equivalent.
Why Ubuntu Is Betting on RustRust’s strict approach to memory usage eradicates whole classes of vulnerabilities—like buffer overflows and use-after-free—that have long plagued system tools. For a utility as privileged as sudo, these protections offer exponentially greater security value. Ubuntu’s strategy, dubbed “Carefully But Purposefully Oxidising Ubuntu,” is a methodical shift toward memory-safe tooling.
Transitioning in Ubuntu 25.10 and BeyondCanonical has announced that Ubuntu 25.10 (“Questing Quokka”), scheduled for October 9, 2025, will ship sudo‑rs as the default /usr/bin/sudo. This serves as a proving ground ahead of Ubuntu 26.04 LTS (April 2026). Regular users will find no change—commands, flags, and password prompts remain familiar—while Ubuntu monitors real-world feedback.
Ensuring CompatibilityTo deliver a smooth switch, Canonical is funding “Milestone 5” development in sudo‑rs to implement:
-
NOEXEC for shell escape control,
-
AppArmor integration,
-
sudoedit,
-
Support for kernels older than 5.9 (critical for Ubuntu 20.04 containers).
A “less‑is‑more” philosophy guides, meaning legacy niche features—like LDAP-based sudoers—might remain absent. But, for most workflows, sudo‑rs should cover every essential feature.
Coexistence and RollbackUbuntu’s old sudo will still be available in the repositories and can be reselected via the alternatives system. Users needing features not yet ported to sudo‑rs can effortlessly revert.
Go to Full Article