Reco <recovery...@gmail.com> writes:
> Tom H <tomh0...@gmail.com> wrote:
>> On Fri, Oct 25, 2013 at 9:16 PM, Reco <recovery...@gmail.com> wrote:

>> >>> Considering that primary usage of sudo is to provide controlled
>> >>> privilege escalation to uid=0, using unsupported (therefore - not
>> >>> updated unless local sysadmins care about security) sudo on these OSes
>> >>> is basically equivalent to giving everyone uid=0.
>> >>
>> >> Somewhat exaggerated :)
>> >
>> > No offense meant, but probably you're living in a some kind of IT
>> > paradise ;) 'Nobody does no evil, nobody does any mistakes' kind of
>> > paradise.
>> 
>> Not updating/patching sudo isn't equivalent to giving everyone root
>> access! It's a BIG leap!
>
> True, you need to add to the picture that curious user who just read on
> Bugtraq or Full Disclosure about fresh vulnerability in sudo. Or that
> disgruntled user who needs /etc/system changed right here and now. Or
> that developer who needs to do this 'small change, nobody will notice'
> on a production server.
> And if you don't have such people there - good for you, as here we can
> always find such person here.

You also have to add to the picture such a vulnerability, and I haven't
noticed any.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1b38nmdqfg....@snowball.wb.pfeifferfamily.net

Reply via email to