Freek Dijkstra wrote:
Martin Schulze wrote:
Proposed updates for woody and sarge are here:
http://klecker.debian.org/~joey/security/sudo/
I'd be glad if you could test them.r
That's awesome. Thanks! Here, have some karma :-)
:)
I just installed your version on sarge using:
- Remove
Proposed updates for woody and sarge are here:
http://klecker.debian.org/~joey/security/sudo/
I'd be glad if you could test them.r
Regards,
Joey
--
Linux - the choice of a GNU generation.
Please always Cc to me when replying to me on the lists.
--
To UNSUBSCRIBE, email to [EMAIL
Martin Schulze wrote:
Proposed updates for woody and sarge are here:
http://klecker.debian.org/~joey/security/sudo/
I'd be glad if you could test them.r
That's awesome. Thanks! Here, have some karma :-)
I just installed your version on sarge using:
- Remove my (custom) Defaults line in my
Martin Schulze wrote:
Proposed updates for woody and sarge are here:
http://klecker.debian.org/~joey/security/sudo/
I'd be glad if you could test them.r
That's awesome. Thanks! Here, have some karma :-)
I just installed your version on sarge using:
- Remove my (custom) Defaults line in my
Freek Dijkstra wrote:
The correct action in this case, IMHO, should have been to apply the
patch (of course!), but also add a postinst script, which gives a BIG
warning telling people that they need to change /etc/sudoers
The postinst script by kernel-image-* packages are examples of how it
Hi,
Allow me to step on my little soap box here.
As many users of the sudo package, I also found that sudo was broken
after a apt-get upgrade. Apparently, the fix of DSA-945-1 was the culprit.
Reading through the announcement, I think the security team made the
right decision to solve
Freek Dijkstra wrote:
The correct action in this case, IMHO, should have been to apply the
patch (of course!), but also add a postinst script, which gives a BIG
warning telling people that they need to change /etc/sudoers
The postinst script by kernel-image-* packages are examples of how it
7 matches
Mail list logo