Securing Linux: Steady Momentum in AppArmor and SELinux Uptake

1 month ago
by George Whittaker Introduction

In recent times, two critical Linux security frameworks, AppArmor and SELinux, have seen noteworthy acceleration in real-world deployment. As Linux continues to anchor enterprise, container, cloud, and desktop systems, these Mandatory Access Control (MAC) tools have crossed threshold events signaling broader acceptance. This article examines those pivotal inflection points, dives into why they matter, and offers reflections on the shifting landscape of Linux security.

A Swift Journey to Widespread Use SELinux’s Ascendancy

Originally conceived by the NSA and later shepherded by Red Hat, SELinux added powerful MAC controls to Linux by the early 2000s. Since being fully embedded into the Linux 2.6.x kernel, SELinux has steadily expanded its reach. It has become the default security layer on Red Hat Enterprise Linux, Fedora, and their derivatives, and integrated into Debian 9+, plus Ubuntu from version 8.04. Android further embraced SELinux starting from version 4.3, marking its normalization in mobile devices.

But the most recent watershed occurred in early 2025: openSUSE Tumbleweed made SELinux the default MAC for new installations beginning with snapshot 20250211, accompanied by minimalVM images running in enforcing mode. Existing installations remain unaffected unless manually migrated, and AppArmor remains an installer option. Moreover, openSUSE Leap 16 will be shipping with SELinux in enforcing mode by default, affirming a full shift within SUSE ecosystems.

This chain of events reflects a conscious pivot in favor of SELinux across both SUSE and community platforms, aligning them more closely with enterprise-grade security policies.

AppArmor’s Established Reach

AppArmor, originally named SubDomain in the late '90s, emerged from Immunix and later became a core tool in SUSE distributions. It officially became part of the Linux kernel in version 2.6.36 around October 2010. Ubuntu began shipping it by default starting with 7.10; by 8.04, CUPS was protected. Over the following releases, its scope widened to include MySQL, libvirt, browser sessions, and more. In Debian 10 ("Buster"), released July 2019, AppArmor became enabled by default, anchoring its adoption across Debian-based ecosystems.

Go to Full Article
George Whittaker

[Testing Update] 2025-07-24 - Kernels, Firefox, Nvidia, 0ad

1 month ago

Hello community, here we have another set of package updates.

Current Promotions Recent News Valkey to replace Redis in the [extra] Repository (click for more details) Previous News Finding information easier about Manjaro (click for more details) Notable Package Updates Additional Info Python 3.13 info (click for more details) Info about AUR packages (click for more details)

Get our latest daily developer images now from Github: Plasma, GNOME, XFCE. You can get the latest stable releases of Manjaro from CDN77.

Our current supported kernels
  • linux54 5.4.296
  • linux510 5.10.240
  • linux515 5.15.189
  • linux61 6.1.147
  • linux66 6.6.100
  • linux612 6.12.40
  • linux615 6.15.8
  • linux616 6.16.0-rc7
  • linux61-rt 6.1.146_rt53
  • linux66-rt 6.6.99_rt58
  • linux612-rt 6.12.39_rt11
  • linux615-rt 6.15.0_rt2

Package Changes (Thu Jul 24 16:30:18 CEST 2025)

  • testing core x86_64: 6 new and 6 removed package(s)
  • testing extra x86_64: 1639 new and 1616 removed package(s)
  • testing multilib x86_64: 8 new and 8 removed package(s)

Overlay Changes

  • testing core x86_64: 16 new and 16 removed package(s)
  • testing extra x86_64: 137 new and 241 removed package(s)
  • testing multilib x86_64: 2 new and 2 removed package(s)

A list of all changes can be found here.

Click to view the poll.

Check if your mirror has already synced:

8 posts - 7 participants

Read full topic

philm

Fortifying Ubuntu’s Root with sudo‑rs: How Rust Reinforces Privilege Escalation

1 month 1 week ago
by George Whittaker Introduction

Privilege escalation in Linux has always walked a tightrope between convenience and risk. sudo allows users to perform tasks as root without sharing the root password—intuitive, powerful—but also a high-value target for exploits rooted in memory safety bugs. Ubuntu is now pioneering a transition: replacing the traditional C-based sudo with sudo‑rs, a Rust-powered rewrite engineered for safer root handling.

Understanding sudo‑rs

Built under the Trifecta Tech Foundation’s “Privilege Boundary” initiative, sudo‑rs is a from-scratch implementation of sudo and su created in Rust, a language celebrated for its compile-time guarantees against memory mishaps. Designed to behave like the classic “sudo,” it supports user prompts, permission checks, and environment handling, but keeps underlying behavior Turing-equivalent.

Why Ubuntu Is Betting on Rust

Rust’s strict approach to memory usage eradicates whole classes of vulnerabilities—like buffer overflows and use-after-free—that have long plagued system tools. For a utility as privileged as sudo, these protections offer exponentially greater security value. Ubuntu’s strategy, dubbed “Carefully But Purposefully Oxidising Ubuntu,” is a methodical shift toward memory-safe tooling.

Transitioning in Ubuntu 25.10 and Beyond

Canonical has announced that Ubuntu 25.10 (“Questing Quokka”), scheduled for October 9, 2025, will ship sudo‑rs as the default /usr/bin/sudo. This serves as a proving ground ahead of Ubuntu 26.04 LTS (April 2026). Regular users will find no change—commands, flags, and password prompts remain familiar—while Ubuntu monitors real-world feedback.

Ensuring Compatibility

To deliver a smooth switch, Canonical is funding “Milestone 5” development in sudo‑rs to implement:

  • NOEXEC for shell escape control,

  • AppArmor integration,

  • sudoedit,

  • Support for kernels older than 5.9 (critical for Ubuntu 20.04 containers).

A “less‑is‑more” philosophy guides, meaning legacy niche features—like LDAP-based sudoers—might remain absent. But, for most workflows, sudo‑rs should cover every essential feature.

Coexistence and Rollback

Ubuntu’s old sudo will still be available in the repositories and can be reselected via the alternatives system. Users needing features not yet ported to sudo‑rs can effortlessly revert.

Go to Full Article
George Whittaker

[Stable Update] 2025-07-20 - Kernels, Mesa, Thunderbird, LibreOffice, Perl, Vulkan

1 month 1 week ago

Hello community, here we have another set of package updates.

Current Promotions Recent News Valkey to replace Redis in the [extra] Repository (click for more details) Previous News Finding information easier about Manjaro (click for more details) Notable Package Updates Additional Info Python 3.13 info (click for more details) Info about AUR packages (click for more details)

Get our latest daily developer images now from Github: Plasma, GNOME, XFCE. You can get the latest stable releases of Manjaro from CDN77.

Our current supported kernels
  • linux54 5.4.296
  • linux510 5.10.240
  • linux515 5.15.189
  • linux61 6.1.146
  • linux66 6.6.99
  • linux612 6.12.39
  • linux615 6.15.7
  • linux616 6.16.0-rc6
  • linux61-rt 6.1.134_rt51
  • linux66-rt 6.6.94_rt56
  • linux612-rt 6.12.28_rt10
  • linux615-rt 6.15.0_rt2

Package Changes (Sat Jul 19 08:50:01 CEST 2025)

  • stable core x86_64: 30 new and 31 removed package(s)
  • stable extra x86_64: 1878 new and 1874 removed package(s)
  • stable multilib x86_64: 22 new and 22 removed package(s)

A list of all changes can be found here.

Click to view the poll.

Check if your mirror has already synced:

71 posts - 41 participants

Read full topic

philm

[Testing Update] 2025-07-19 - Kernels, Mesa, Thunderbird, Grub, Perl, Vulkan

1 month 1 week ago

Hello community, here we have another set of package updates.

Current Promotions Recent News Valkey to replace Redis in the [extra] Repository (click for more details) Previous News Finding information easier about Manjaro (click for more details) Notable Package Updates Additional Info Python 3.13 info (click for more details) Info about AUR packages (click for more details)

Get our latest daily developer images now from Github: Plasma, GNOME, XFCE. You can get the latest stable releases of Manjaro from CDN77.

Our current supported kernels
  • linux54 5.4.296
  • linux510 5.10.240
  • linux515 5.15.189
  • linux61 6.1.146
  • linux66 6.6.99
  • linux612 6.12.39
  • linux615 6.15.7
  • linux616 6.16.0-rc6
  • linux61-rt 6.1.134_rt51
  • linux66-rt 6.6.94_rt56
  • linux612-rt 6.12.28_rt10
  • linux615-rt 6.15.0_rt2

Package Changes (Sat Jul 19 08:50:01 CEST 2025)

  • testing core x86_64: 15 new and 15 removed package(s)
  • testing extra x86_64: 1752 new and 1744 removed package(s)
  • testing multilib x86_64: 22 new and 22 removed package(s)

Overlay Changes

  • testing core x86_64: 19 new and 20 removed package(s)
  • testing extra x86_64: 124 new and 126 removed package(s)

A list of all changes can be found here.

Click to view the poll.

Check if your mirror has already synced:

21 posts - 12 participants

Read full topic

philm