Debian Security Advisory DSA 735-1 (sudo)

Summary
The remote host is missing an update to sudo announced via advisory DSA 735-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20735-1
Insight
A local user who has been granted permission to run commands via sudo could run arbitrary commands as a privileged user due to a flaw in sudo's pathname validation. This bug only affects configurations which have restricted user configurations prior to an ALL directive in the configuration file. A workaround is to move any ALL directives to the beginning of the sudoers file see the advisory at http://www.sudo.ws/sudo/alerts/path_race.html for more information. For the old stable Debian distribution (woody), this problem has been fixed in version 1.6.6-1.3woody1. For the current stable distribution (sarge), this problem has been fixed in version 1.6.8p7-1.1sarge1. Note that packages are not yet ready for certain architectures these will be released as they become available. We recommend that you upgrade your sudo package.