A buffer overflow exists in the sudo program which could be used by an
attacker to obtain higher privileges. sudo is a program used to
delegate superuser privileges to ordinary users and only for specific
99e75efab098e51b516f8030eafb2993 7.1/RPMS/sudo-1.6.3p6-1.2mdk.i586.rpm 672e152db4d8d0e742ad404cf81ca3d1 7.1/SRPMS/sudo-1.6.3p6-1.2mdk.src.rpm
fe583824271ac2a5af6dd533027e8794 7.2/RPMS/sudo-1.6.3p6-1.1mdk.i586.rpm 2327674548ed850b078d3ae1badf7d2e 7.2/SRPMS/sudo-1.6.3p6-1.1mdk.src.rpm
To upgrade automatically, use MandrivaUpdate.
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.