Package: sudo
Version: 1.6.8p12-5
Severity: important

Hi,

I was relying entirely on sudo + sudo group to get access to the root account
on which the root password was disabled.
After upgrade to 1.6.8p12-5 nothing alerted me but the fact is that on 
next login I could not get root access anymore.
My box is in a datacenter with hardware raid so it was extremely difficult to 
recover from such a situation.

Probably you've good reasons to drop default support of sudo group but
*please* use debconf to prompt the user and tell him, it's only when I read
the newly installed /usr/share/doc/sudo/NEWS.Debian.gz that I understood 
what happened.

I graded this report as important because of the worries it can cause to admins
with similar setup.

Phil

PS: now I've taken measures to ensure safe root access when sudo is not 
working...

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.18-1-686 (SMP w/1 CPU core)
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages sudo depends on:
ii  libc6                       2.3.6.ds1-13 GNU C Library: Shared libraries
ii  libpam-modules              0.79-4       Pluggable Authentication Modules f
ii  libpam0g                    0.79-4       Pluggable Authentication Modules l

sudo recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to