Sudo security advisory

Mike Tancsa mike at
Mon Jan 30 15:56:51 UTC 2012


>From the advisory,

Successful exploitation of the bug will allow a user to run arbitrary
commands as root.
Exploitation of the bug does *not* require that the attacker be listed
in the sudoers file. As such, we strongly suggest that affected sites
upgrade from affected sudo versions as soon as possible.


Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike at
Providing Internet services since 1994
Cambridge, Ontario Canada

More information about the freebsd-ports mailing list