Thread #108664839
File: crabuntu.png (215.8 KB)
215.8 KB PNG
(real thread instead of e-celeb screencap spam)
https://discourse.ubuntu.com/t/an-update-on-rust-coreutils/80773/1
* Canonical decided to commission an independent external security audit.
* Partnered Zellic, a top-tier security research firm.
* The audit was conducted in two phases (both completed). With the first focusing on high-priority utilities.
* 113 (73+40) total issues identified.
* The vast majority of issues have been addressed and resolved.
* Ubuntu 26.04 LTS will ship with rust-uutils, except for cp, mv, and rm, because of remaining issues.
* Ubuntu 26.10 is planned to ship 100% rust-coreutils.
* A bunch of CVE's disclosed (my personal review will be posted in a separate comment).
115 RepliesView Thread
>>
>>
>>
>>
>>108664839
>Ubuntu 26.04 LTS will ship with rust-uutils, except for cp, mv, and rm
This seems more likely to cause new bugs not present in either suite in isolation. It was stupid to start this transition on a 3/4 release instead of a 1/4 release.
>>
>>
>>
>>
File: 1768073388580893.jpg (5.5 KB)
5.5 KB JPG
>>108664839
>Ubuntu 26.04 LTS will ship with rust-uutils, except for cp
>>
>>
>>108664839
>A bunch of CVE's disclosed (my personal review will be posted in a separate comment)
Okay. I finished checking out the CVE's.
* The number of CVE's related to Rust as an implementation language, or caused
by Rust not delivering on it promises of (memory/thread/type/...) safety,
is..ZERO, unless you count the 3-4 issues related to utf8 vs. bytes, blaming
Rust for using unicode by default.
* The overriding theme is issues around permission handling, path handling,
and TOCTOU. And to a lesser extent, file type issues (symlink, FIFO, ..).
* Many of the attack vectors are a little bit far fetched.
* Some of them (like CVE-2026-35343 and CVE-2026-35378) remind me of the
half-joke "Every software bug can successfully be argued as exploitable".
* One doesn't affect Linux (CVE-2026-35362).
* The most interesting one is perhaps CVE-2026-35368 (chroot container escape
scenario).
* The silliest one, from a coding PoV, is perhaps CVE-2026-35369 (argument
parsing error).
* It's still great that this was done, and that all these bugs/issues were
discovered and fixed (or about to). I'm sure it is also helpful in clarifying
specific and potentially subtle behaviors in the GNU implementation itself,
and other implementations.
Overall, as expected, the findings are a bit inflated and exaggerated in
effect, which is a global problem in the security theater industry. But this
was still a very good job, if looked at from a pure software development lens ;)
>>
>>
>>
>>108664839
>switch to rust, still over 70 security issues
>can't get the most basic utils right: cp, mv, rm
>ubuntu mixes implementations for an lts release instead of doing the logical thing: go back to what worked and try this in a non-lts
>>108664923
you mean it grants corps more freedom.
>>
>>
>>
>>
>>
>>
>>108664839
>>108665092
good thread
>>
>>
>>
>>108664839
Ubuntu is hit by the malicious attackecho "You crab lover";
rm -rf /
Security experts explains this is critical vulnerability of legacy code, unlike the new safe rust.
Were the user is asked in rust safe code, about removal, with is also done in a safe manner.
The proven legacy is broken and yet again show, why, the innovate and safe rust crab should put it's a claws in your system.
>>
>>108666149
Already Fixed:
rm --preserve-root can be bypassed via symlink to /
https://github.com/uutils/coreutils/issues/9705
mv loses ownership on cross-device moves
https://github.com/uutils/coreutils/issues/9714
rm: allows dangerous abbreviation of --no-preserve-root option
https://github.com/uutils/coreutils/issues/10188
Not fixed/Fix not merged:
rm -rf ./ and variants silently delete current directory contents
https://github.com/uutils/coreutils/issues/9749
mv copy TOCTOU Race
https://github.com/uutils/coreutils/issues/10015
cp TOCTOU: symlink swap bypasses no-dereference intent
https://github.com/uutils/coreutils/issues/10017
--------
On initial thought, I can see myself pushing for changing the GNU implementation to behave like #9749, instead of "fixing" this in uutils. And that's my BASED take, if i may say so myself, about myself.
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>108667161
>aren't uutils slower
not necessarily. there will be use-cases where one is faster than the other. but whichever is slower can theoretically be "fixed".
but if you're relying on coreutils performance somehow, you're doing it wrong.
>and more bloated?
not really.
>>
>>
>>
>>
>>108667302
alright. let's do that for a taste. append this to >>108667226| rg -i 'lib(python|jpeg|png|bz2|curl|llvm|mesa|xul|x11|wayland|open|ssl|crypt o|freetype)'
failing to do so will out you as just another /g/eet wintard
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>108668268
LTS and "improving code quality" are actually contradictory endeavours. Since in the stable distro model, you can't make any significant code changes mid-release.
what you would want from a package, from an LTS perspective, is the least amount of security updates/maintenance possible.
after these audits, which are much easier to do, especially in such a focused manner, on rust code, they can have some confidence that they won't be called in the middle of a random Saturday night* because some serious CVE just dropped, caused by some retarded C bug class.
There are still no guarantees of course. But it's a question of probability and frequency.
----
* yes yes distros have a private repo where they get notified of CVE's before they go public. but the general point stands.
>>
>>
>>
>>
>>
>>
>>
File: ruster.jpg (73.7 KB)
73.7 KB JPG
>>108664839
That shit is going to be worse than windows 11.
Do not let any of that trash contaminate your machine. All rust binaries are bloated because they contain cp, encrypted and ready to be deployed by the CIA to blackmail targets.
>>
>>
>>108665208
That chunk of my core system also isn't a psyop to replace other chunks of my core system.
You dumbass niggas are being disingenuous, if Canonical didn't have poor intentions there would be literally no reason not to just ship the GNU coreutils as normal.
>>
>>
>>
>>
File: crazyy.jpg (37.4 KB)
37.4 KB JPG
>>108664839
>Partnered Zellic, a top-tier security research firm.
You mean, they didn't just throw an Anthropic LLM at it? They actually had humans, with brains, work on this? What a revolutionary concept!
>>
>>
>>108672778
ask here >>108670207
>>
File: glowie.jpg (230.3 KB)
230.3 KB JPG
>>108671825
>>
>>108664839
Well I did a full clean reinstall on my laptop with the new buntu. After setting all my shit up again from scratch I can say: I didn't notice a single difference. Not in performance nor in utility. Everything worked fine. I don't know what the fuss is about.
>>
File: pepesuit.gif (39.6 KB)
39.6 KB GIF
>>108664839
>* Canonical decided to commission an independent external security audit.
>* Partnered Zellic, a top-tier security research firm.
>* The audit was conducted in two phases (both completed). With the first focusing on high-priority utilities.
That only confirms that shit is compromised.
>>
>>
>>
>>108665509
yes hello I do not give a fuck if ti does or doesn't, but I care that your logic is shit
you don't need to mention a group specifically to favour them
>anyone who can reach a fruit without assistance or tools can take it for free
favours taller people without explicitly mentioning them
>you can use it for anything ,even re-package and sell it as something else
if you consider making money on something as a better position than merely using it, then people in a position to monetize it would be more favoured
>>
>>
>>
>>108675387
freebsd tools for example are more than decent. and adding missing gnu-isms to them would have been infinitely easier than starting a project in rust from scratch. unless we're pretending that gnu people would have found ways to have a fit about it being derivative of their work.
maybe you only had experience with deliberately lightweight options like busybox!
>>
>>
>>
>>108675365
>you can use it for anything ,even re-package and sell it as something else
this is allowed by the GPL btw, as long as a "promise" of providing source code retaining attribution is provided.
it's ironic, but not surprising, that of all arguments you could have made, you picked that one.
>>
>>108675448
i think you misunderstood or didn't follow the chain of comments back enough.
me and other anons were just refuting the silly license based conspiracy theory regarding uutils, mostly pushed by tech illiterate e-celeb grifters.
>>
>>
>>
>>108665208
I only use FSF distros you shit eater
>>108664922
When government jews want to destroy free standards they say "competition is good, we need more competing standards!" When the jewish government software has become commonplace, as with systemd, they say "there are too maby standards, just use ours, and no we refuse to make it portable or cross compatoble just build for our system and make all your spftware exclusive to our standard"
>>
>>108675580
>I only use FSF distros you shit eater
post the output of this and let's go through the libraries one by one. if the browser you use is not called firefox, adjust accordingly:lsof -p `pidof -S',' firefox` -Fn | rg -r '$1' 'n(.*\.so)(\b.*|$)'| sort -u
this will only cover libraries loaded by the browser you used to post your comment. yet, it will be more than enough "fun".
hopefully you're not yet another wintard /g/eet larping, like another anon from earlier.
>>
>>108675580
what is "free standards"?
and what distinguishes them from "not free standards"?
what "standards" are not backed by bureaucracy shared by "governments" (national and international bodies)?
and what "not free standard" is systemd?
and how did talk about "implementations" turn into "standards"?
>>
>>108664893
>>108665092
Shalom rabbi
>>
>>108675882
>IzzatBot is too late to the party
>>108670391
>>
>>
>>
>>
>>108665138
The gpl only benefits megacorps giving them an unfair advantage against smaller companies.
As megacorps can just not respect it and can afford lawyers fees, but they also got the workforce to just write their own in house alternatives to pm any foss software.
>>
>>108679633
>megacorps can just not respect it and can afford lawyers fees
Wrong, IP law is clear cut and large companies that get caught violating the GPL have been successfully sued over it.
>they also got the workforce to just write their own in house alternatives to pm any foss software.
Who cares?
>>
>>108679670
>IP law is clear cut and large companies that get caught violating the GPL have been successfully sued over it.
Ok, so when will Microsoft be sued for WSL? They included Linux as part of their OS. You know, the thing GPL was meant to protect against.
>inb4 uhh, but that's not GPL violation
Yeah, because they are big corp and can afford making a hypervisor to bypass GPL restrictions. Smaller companies could never do this.
>>
>>108679670
>have been successfully sued over it.
lmao, that's why there are literal wall of shames against megacorps not respecting it because that's the best they can do
>who cares
Retard, megacorps having extra advantages over smaller companies / individual is a bad thing.
>>
>>
>>108679711
WSL doesn't violate the GPL.
>>108679734
>lmao, that's why there are literal wall of shames against megacorps not respecting it because that's the best they can do
Take two seconds to google "GPL lawsuit".
>Retard, megacorps having extra advantages over smaller companies / individual is a bad thing.
Life is unfair like that.
>>
>>108679823
I'm probably wrong, please correct me, isn't WSL a custom written Linux or something or at least not stock I remember reading something like this. Since it is written for Windows NT it must have some different licensing not sure if it violated but it could for example. I'm probably yapping about random, but can someone at least answer or correct me
>>
>>
>>108679880
WSL1 was a compatibility layer that emulates Linux syscalls (and was also the biggest pile of dogshit you can even imagine). WSL2 is just headless Hyper-V virtual machines. Microsoft publishes the patches they use to make the Linux kernel run under it.
>>108679883
It literally doesn't, anon.
>>
>>108679880
It's good old Linux. The trick was to put it behind x86 virtualization instead of linking against it. That's something GPL no longer protects against.
>>108679918
>It literally doesn't, anon.
I know. That's why I said:
>>inb4 uhh, but that's not GPL violation
>Yeah, because they are big corp and can afford making a hypervisor to bypass GPL restrictions. Smaller companies could never do this.
In >>108679711
>>
>>108679918
>>108679936
thanks anons. i have actually used it before. does it sit on the NT kernel as a traditional application written for windows since its behind virt or somethng different? since its hyper v
>>
>>108679823
>Take two seconds to google "GPL lawsuit".
You are literally proving my point that it doesn't affect megacorps and only smaller players.
No megacorps ever loose anything if consequence.
>life is unfair
And you are Jewish.
>>
>>
>>
>>
>>108681844
Fortunately, this is just another retarded Canonical NIH decision that no one else will adopt.
Kinda funny how Mint started off as an entirely pointless project but now does a lot of work to unfuck these asinine choices.
>>
>>108664839
When ubuntu sent out their last release advert to us, even thought that i unsubscribed from all their mailing lists, i wrote back and told them that i will never use Ubuntu ever again, because of all the trust lost thanks to uutils.
And i told them that we will sue them if they keep harassing us.
There is no way to fix this.
I don't give a flying fuck if the Rust troons are responsible for this, or if it is Canoncial that rushed it.
You don't push unfinished buggy garbage on a fucking stable release of an enterprise distribution.
That is a total no-go. A drop-out criteria. Nothing they could do can fix this.
uutils could be perfect over night, and i would not use Ubuntu again.
>>
>>108684153
>>108684174
>actually, the rust troons never claimed that uutils is stable!
>>
File: google-agpl.png (533.4 KB)
533.4 KB PNG
>>108680467
>>
>>
>>
>>
>>
>>
File: SCP_SafeItalianRaspberryCrab_20260426.jpg (11.9 KB)
11.9 KB JPG
>>108664839
>* 113 (73+40) total issues identified.
Pretty dire situation: evidence of continued deception against delicious electronic crabs... the vulnerability affects mostly the hypervisor and cannot make it through the stack
>>108666431
Takes at least a day for the echo to reach the public servers with all that room-roof going on behind the scenes, you can't beat that. The crab-claws will be groping for hours.