![](https://seccdn.libravatar.org/avatar/a895f78a81a109471893519443e4d933.jpg?s=120&d=mm&r=g)
http://bugzilla.opensuse.org/show_bug.cgi?id=1205094 http://bugzilla.opensuse.org/show_bug.cgi?id=1205094#c14 Frank Kr�ger <fkrueger@mailbox.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |fkrueger@mailbox.org --- Comment #14 from Frank Kr�ger <fkrueger@mailbox.org> --- (In reply to Milachew from comment #13)
(In reply to William Brown from comment #11)
I did not make the change. I highlighted that the default targetpw mode in SUSE and OpenSUSE in insecure and involved the needed parties.
Please be careful when you make accusations like this, especially when they are incorrect.
Yes, you're right. I took a closer look at the changes on build.opensuse.org and I realized that I was wrong. You are not directly involved in what happened to the sudo package in TW.
I apologize for finding you to blame for this.
As a result, my input to Jason would be that:
* We revert the change. * We attempt to understand why this error was missed in AutoQA and how that impacted the a new install. * That the Yast2 team is involved in the next time we attempt this update.
I am glad that this particular change is really recognized as a mistake. I hope that the necessary changes will be made in openQA to prevent such things as soon as possible.
By the way, rolling back the changes has already been proposed : https://build.opensuse.org/request/show/1033735
But what about TW users, who have been hit by this? Is there any solution in sight? Thx. -- You are receiving this mail because: You are on the CC list for the bug.