On Thu, 25 Aug 2011 22:01:47 +0000, Thorsten Glaser <t...@mirbsd.de> wrote:
> Package: sudo
> Version: 1.8.2-1
> Severity: normal
> 
> Apparently, there's a new directive in the default sudoers now:
> | Defaults    
> secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
> 
> Without it, "sudo visudo" will fail. When asking Y to let dpkg
> overwrite the existing conffile on the system, people might lose
> root access to the entire machine. (No, I said N and manually
> run "sudo /usr/sbin/visudo" then merging it.)

Right, I resolved multiple long-standing bugs regarding the previous
approach of hard-coding the secure path at compile time by moving the
definition to sudoers.  That's a feature, not a bug, but it's certainly
true that any time sudoers is updated there's a chance the admin will
have trouble.

> Like when env_reset became default (one of the first things I
> remove), this changes the default behaviour in an unsafe way,
> and as such should not (IMHO) be forced on the user on upgrade,
> i.e. upgrading existing systems should keep the older behaviour
> (while warning about it, probably).

Nothing is "forced on the user", the conffile handling is doing exactly
what is expected.  If the admin chooses to not accept the update, the
worst that happens is they have to fully qualify command paths until
they've patched up sudoers.

> Also, visudo now asks
> | press return to edit /etc/sudoers.d/README:
> which, while cosmetic, will lead to much frustration and some
> confusion under the sysadmins.

I don't see that.  What command causes you to get that message?

Bdale

Attachment: pgpy3JXOHg1wM.pgp
Description: PGP signature

Reply via email to