Conversation

Replying to
I see memory safety as something of a distraction here. While the specific mechanism in this case involved unsafe access to heap, the underlying problem is complex logic & string processing of any sort with elevated privileges.
1
10
Replying to and
Typical usage of sudo is entirely security theater and this is yet another nice example of how the attack surface added by security theater can cause harm. It's possible to use sudo to only permit running specific commands but... it's not usually a good way to approach anything.
1
3
An uncontained process running as the user can substitute a sudo command or intercept the user's password either with sudo or elsewhere. The typical usage is allowing users to run any command as root. What's the advantage of that supposed to be over having the root password?
1
1
I don't think the solution is rewriting sudo in a memory safe language but rather getting rid of it. Better to handle every normal use case via a proper design for it (support user-specific app installs, etc.). Sysadmin can login as root via a virtual console. Works fine.
2
3