Package: sudo Version: 1.6.8p12-5 Severity: important Hi,
I was relying entirely on sudo + sudo group to get access to the root account on which the root password was disabled. After upgrade to 1.6.8p12-5 nothing alerted me but the fact is that on next login I could not get root access anymore. My box is in a datacenter with hardware raid so it was extremely difficult to recover from such a situation. Probably you've good reasons to drop default support of sudo group but *please* use debconf to prompt the user and tell him, it's only when I read the newly installed /usr/share/doc/sudo/NEWS.Debian.gz that I understood what happened. I graded this report as important because of the worries it can cause to admins with similar setup. Phil PS: now I've taken measures to ensure safe root access when sudo is not working... -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.18-1-686 (SMP w/1 CPU core) Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages sudo depends on: ii libc6 2.3.6.ds1-13 GNU C Library: Shared libraries ii libpam-modules 0.79-4 Pluggable Authentication Modules f ii libpam0g 0.79-4 Pluggable Authentication Modules l sudo recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]