On 2013-11-02, Cybe R. Wizard <cybe_r_wiz...@earthlink.net> wrote:
>> http://www.sudo.ws/sudo/alerts/sudo_debug.html
>>  
>>  Impact: Successful exploitation of the bug will allow a user to run
>> arbitrary commands as root.
>> 
>>  Exploitation of the bug does not require that the attacker be listed
>> in the sudoers file. As such, we strongly suggest that affected sites
>> upgrade from affected sudo versions as soon as possible. 
>> 
> How valid is that considering that Wheezy is using sudo
> version 1.8.5p2-1+nmu1 ?  May I assume that there are still a lot of
> non-upgraded machines out there?  Maybe best advice would be to upgrade
> their whole Debian.

I thought we were talking about people running "unpatched" sudos in
distros where the program isn't included in the official repositories of
packages and therefore gets no security updates (or something)?


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/slrnl7ad5p.37q.cu...@einstein.electron.org

Reply via email to