Interesting vulnerability that allows a user listed in /etc/sudoers to bypass authentication by resetting the time stamp file with "sudo -k" or removing it with "sudo -K".
http://www.sudo.ws/sudo/alerts/epoch_ticket.html
Probably not as big a deal for Slackware as it could be for *buntu but perhaps this could be a convenient time for Pat to upgrade sudo anyway.
I've built 1.8.6p7 using the SlackBuild in current and sudo seems to function as it did before.