Conversation

Replying to
I see memory safety as something of a distraction here. While the specific mechanism in this case involved unsafe access to heap, the underlying problem is complex logic & string processing of any sort with elevated privileges.
1
10
Replying to and
Typical usage of sudo is entirely security theater and this is yet another nice example of how the attack surface added by security theater can cause harm. It's possible to use sudo to only permit running specific commands but... it's not usually a good way to approach anything.
1
3
The disadvantage is that any user on the system with access to the command can exploit vulnerabilities in it to take over the system. That includes applications running as their own user such as a web server, unless they have at least basic sandboxing beyond dedicated user/group.
1
1
I don't think the solution is rewriting sudo in a memory safe language but rather getting rid of it. Better to handle every normal use case via a proper design for it (support user-specific app installs, etc.). Sysadmin can login as root via a virtual console. Works fine.
2
3
Show replies