• ammonium@lemmy.world
    link
    fedilink
    arrow-up
    6
    ·
    17 hours ago

    Sudo is being actively developed and has several fairly recent CVEs, some of which are memory issues (at least recent compared to how old sudo is). Apart from being memory safe rust is also better at error handling than C.

    IMO best would be to reduce attack surface by using a memory safe language and also reducing complex features like OpenBSD’s doas does.

    https://www.cvedetails.com/vulnerability-list/vendor_id-15714/Sudo-Project.html?page=1&order=3

    • Mr. Satan@lemmy.zip
      link
      fedilink
      arrow-up
      1
      ·
      15 hours ago

      Well that’s the thing that I don’t see communicated. Is it actively developed? Bug fixes doesn’t count, it’s maintenance not active development. If I’m just doing maintenance then there must be a lot of issues to warrant a rewrite, especially in a different language.

      Form what I keep seeing it looks like a rewrite for the sake of rewriting, which is at best misguided reasoning.

      I can see an argument that the cost of failure is very high with something like sudo, but I don’t see it vocalized anywhere.

        • Mr. Satan@lemmy.zip
          link
          fedilink
          arrow-up
          1
          ·
          6 hours ago

          Went through the releases quickly and it does look like maintenance work is being done more than anything.

          Last minor version update was in 2020 which is not that recent (although quite recent). All other releases since have mostly fixes. I’ve seen only a couple of things that were not Fixed something in the notes.

          Maybe our definitions of active development are different, but to me this does look like maintenance.