I picked one of the bugs (see bottom of email). Is
this sort of information is useful to the security
team and if so, how?





vulnerability: sudo race condition.
Severity: High
Type: local

References: 
CAN-2005-1993
BID:13993
URL:http://www.securityfocus.com/bid/13993
http://www.sudo.ws/sudo/alerts/path_race.html

Affected version: 1.3.1 up to and including 1.6.8p8.

Debian versions: 
woody: sudo_1.6.6-1.3
sarge: sudo_1.6.8p7-1.1
testing: sudo_1.6.8p7-1.1
unstable: sudo_1.6.8p7-1.1

No mention of the bug in the changelog:
http://smallr.com/so

Status: Debian is affected

Actions that need to be taken: 

Package Maintainer Action:
Create new sudo package version 1.6.8p9 or greater.
Request a patch from the maintainers.
http://www.sudo.ws/sudo/authors.html

User Action:
Upgrade: The bug is fixed in sudo 1.6.8p9. There is no
package available so a local build or install will be
required.

Current Workaround:
The administrator can order the sudoers file such that
all entries granting Sudo ALL privileges precede all
other entries.



Harry
Join team plico. 
http://www.hjackson.org/cgi-bin/folding/index.pl

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to