Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

Debian Security Advisory DSA 596-2 (sudo)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to sudo announced via advisory DSA 596-2.
Insight
Insight
This update removes the debug output which was left over in the update from DSA 596-1. For completeness below is the original advisory text: Liam Helmer noticed that sudo, a program that provides limited super user privileges to specific users, does not clean the environment sufficiently. Bash functions and the CDPATH variable are still passed through to the program running as privileged user, leaving possibilities to overload system routines. These vulnerabilities can only be exploited by users who have been granted limited super user privileges. For the stable distribution (woody) these problems have been fixed in version 1.6.6-1.3. For the unstable distribution (sid) these problems have been fixed in version 1.6.8p3. We recommend that you upgrade your sudo package.
Solution
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20596-2