<html><head><meta http-equiv="Content-Type" content="text/html charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">Hello all!<div><br></div><div>The recently discovered vulnerability in sudo is making me nervous about my old systems. This may be unreasonable, as these systems have plenty of <i>other</i> vulnerabilities and I behave accordingly. However, sudo just seems like such a vital component, and this exploit particularly bad.<br></div><div><br></div><div>It doesn't look like MacPorts sudo has any dependencies, so how terrible of an idea would it be to just plop it in /usr/bin/? Do any obvious pitfalls come to mind, perhaps around configuration file paths? (I also of course realize this would be totally "unsupported", whatever that really means under the circumstances... 🙂)</div><div><br></div><div>I could also just wait for Apple's next open source drop, and see if their patched sudo can be compiled to target older systems... better idea?</div></body></html>