this post was submitted on 11 Nov 2025
166 points (98.8% liked)

Linux

10136 readers
758 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
 

The Ubuntu 25.10 transition to using some Rust system utilities continues proving quite rocky. Beyond some early performance issues with Rust Coreutils, breakage for some executables, and broken unattended upgrades due to a Rust Coreutils bug, it's also sudo-rs now causing Ubuntu developers some headaches. There are two moderate security issues affecting sudo-rs, the Rust version of sudo being used by Ubuntu 25.10.

you are viewing a single comment's thread
view the rest of the comments
[–] just_another_person@lemmy.world 47 points 5 days ago (6 children)

Which batch of you turds was in here all up in my stuff last week when I said Rust projects have security vulnerabilities all the time just as any other and you all were arguing like "nuh-uh cuz Rust"?

Step up.

[–] entwine@programming.dev 51 points 5 days ago (1 children)

Everyone knows that memory safety isn't the only source of security vulnerabilities (unless you're bickering about programming languages on the internet, in which case 100% of security vulnerabilities are related to memory safety)

Rust users are one of Rust's biggest weaknesses.

[–] eah@programming.dev 3 points 5 days ago

memory safety isn’t the only source of security vulnerabilities

I would like you to produce an example of a Rust evangelist disputing this. They're not as dimwitted or misguided as you seem to think.

[–] arcterus@piefed.blahaj.zone 30 points 5 days ago* (last edited 5 days ago) (1 children)

Weren't you the dude posting completely irrelevant articles? As I said before, no one reasonable thinks Rust programs won't have bugs. Rust helps prevent a specific class of vulnerabilities. The rest is, as per usual, up to the programmer to avoid.

EDIT: I browsed your comments to verify. You were indeed the person posting the irrelevant articles about malware written in Rust being used to exploit other programs and using it to claim that software written in Rust was vulnerable.

[–] MTK@lemmy.world 32 points 5 days ago (1 children)

The Rust hype is funny because it is completely based on the fact that a leading cause of security vulnerabilities for all of these mature and secure projects is memory bugs, which is very true, but it completely fails to see that this is the leading cause because these are really mature projects that have highly skilled developers fixing so much shit.

So you get these new Rust projects that are sometimes made by people that don't have the same experience as these C/C++ devs, and they are so confident in the memory safety that they forget about the much simpler security issues.

[–] mesamunefire@piefed.social 14 points 5 days ago (1 children)

Cant tell you how many times Ive heard about curl getting re-written. Same deal.

[–] otacon239@lemmy.world 11 points 5 days ago* (last edited 5 days ago) (1 children)

Surely a direct stream from the internet straight onto host hardware can’t be exploited in any way. All you gotta do is put the stream in a file. How hard could it be? (/s)

[–] arcterus@piefed.blahaj.zone 4 points 5 days ago (1 children)

Tbh that specific case probably wouldn't be a big deal. It's all the extra processing curl can do for http requests and the like that'd be more dangerous to rewrite I'd think.

[–] MoSal@programming.dev 2 points 4 days ago (1 children)

The most relevant part of the curl project is the library, not the CLI tool. And its biggest advantages in addition to universal availability is support for many protocols other than HTTP, flexible interface(s), two useful well-documented and largely stable APIs (one wraps the other for easy use), multiple TLS/SSL back-end support, and finally, the complete(ish) HTTP protocol support. But that last one alone is not that big of a deal. libcurl's implementation even uses external libraries for both HTTP2 and HTTP3 for framing. It uses an external library for QUIC transport support too. Meanwhile, many other independent language implementations for HTTP exist that range from serviceable to complete. Be it Python, Go, Rust, or many others, you usually get a "native" option you could/should use. Gone are the days of bad old PHP. Hell, even some WIP languages add usable native implementations sometimes as a part of their standard libraries, like inko.

Within the Rust ecosystem, you're fully covered by hyper. Even very obscure HTTP features like obsolete HTTP1 multi-line headers are supported (you have to enable this one explicitly). And I only know this because I had the fortunate circumstance of coming across a server that used these (It was an educational, if interesting, couple of afternoon hours).

[–] arcterus@piefed.blahaj.zone 1 points 4 days ago

Yeah, what I was saying was that rather than the basic take URL and just put the file on the filesystem use case (which is in the common case not that difficult with stuff like reqwest or hyper), the other use cases where you for instance use the library to process requests and their responses in non-default or potentially bizarre ways is more likely where there'd be an issue. When I said "extra processing" for requests, I was including for instance potentially dealing with TLS and interactions between underlying libraries and so on with all the various protocols curl supports.

[–] zap12344@feddit.it 14 points 5 days ago (1 children)

To me this says more about Canonical than Rust.

[–] just_another_person@lemmy.world 9 points 5 days ago (2 children)

Canonical didn't make these tools...

[–] caseyweederman@lemmy.ca 21 points 5 days ago (1 children)

They do have a habit of overcommitting to tools that are not yet ready.

[–] 4am@lemmy.zip 15 points 5 days ago (1 children)

Hell, snap still isn’t ready

[–] caseyweederman@lemmy.ca 1 points 5 days ago

No it certainly is not.

[–] vga@sopuli.xyz 16 points 5 days ago* (last edited 5 days ago)

They did choose to adapt them at version <1.0.0

Could be a brave decision that will lead to these tools getting good a lot faster. Many such decisions seem a bit stupid if you only look at the short term.

[–] rikudou@lemmings.world 10 points 5 days ago

The biggest problem with Rust are its users. They somehow think that having a safe memory access means fewer bugs. While it only means fewer memory management related bugs. Which honestly isn't even a problem with modern C++.

[–] SpaceNoodle@lemmy.world 3 points 5 days ago (1 children)

b-b-b-but Rust is inherently safe!

[–] rikudou@lemmings.world 14 points 5 days ago

Yeah, if you hash your passwords with unsalted md5 it's much more secure in Rust than PHP!