Displaying 1 result from an estimated 1 matches for "gems8".
Did you mean:
gems
1999 Nov 12
2
security hole in sudo allows users full access
While sudo is used to give fairly trusted users the ability to run
programs with root privs, there exists a hole in the one in the RedHat
contrib directory (sudo 1.5.9.p4) which allows a minimally trusted user to
obtain full root access and privilege.
If a user is given the opportunity to run any program, that user can
fool sudo and obtain any level of privilege for any executable.
Assume