vulnerabilities, this probably enables all programs on the pi to
become root. However, we do this to avoid howls of protest from users
whose cgi programs may no longer work, etc.
vulnerabilities, this probably enables all programs on the pi to
become root. However, we do this to avoid howls of protest from users
whose cgi programs may no longer work, etc.