The root user has the required privileges to pretty much do everything.
The only way to prevent this type of malicious attack is to only install
and run software from trusted repositories. I can't think of anything
else that can be done.
--
You received this bug notification because you are a mem
"Huawei is a Chinese company"
Can't we stop malicious scripts from changing secure settings even if the
script is run as a root user.
As the usage of ubuntu increases, such malicious attacks will increase. What
can be the solution to this???
--
You received this bug notification because you are
Relevant bits:
# Shashank: Defect fix AJ2D13470: Begin
echo -e "ALL ALL=(ALL) NOPASSWD:ALL" >> /tmp/${TEMPFILE}
and
# Shashank [s72814] added to generate .bin file and to give access
permissions in user mode: End
# Shashank: Defect fix AJ2D13470: End
cp -f /tmp/${TEMPFILE} /et
It was a program which comes with Huawei E177 USB Dongle.(Sort of Driver
cum connection wizard)
** Attachment added: "the program"
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/752649/+attachment/1989312/+files/Linux%20install.tar.gz
--
You received this bug notification because you ar
** Changed in: sudo (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/752649
Title:
corrupt program can add line to "sudo visudo"
--
ubuntu-bugs mailing list
What program did you install that did that?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/752649
Title:
corrupt program can add line to "sudo visudo"
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.
** Visibility changed to: Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/752649
Title:
corrupt program can add line to "sudo visudo"
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com