[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Package sudo-1.9.5p2-10.el9_3.aarch64 download

Name sudo
Epoch 0
Version 1.9.5p2
Release 10.el9_3
Architecture aarch64
Website/URL https://www.sudo.ws
License ISC
Build Time 2024-10-25 15:14:31
Build Host builder-arm64-1.inferitos.ru
Summary Allows restricted root access for specified users
Repositories BaseOS
Description Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines.
Errata INFSA-2024:0811
Size 1059 KiB
Source Project sudo-1.9.5p2-10.el9_3
SHA-256 checksum dbd164ca9df0e9a63f470ce6a045936973c076c219200f8a73ab77dcceea109e
× Full screenshot
Changelog link
* Mon Jan 22 2024 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-10
RHEL 9.3.0.Z ERRATUM
- CVE-2023-28487 sudo: Sudo does not escape control characters in sudoreplay output
Resolves: RHEL-21834
- CVE-2023-28486 sudo: Sudo does not escape control characters in log messages
Resolves: RHEL-21828
- CVE-2023-42465 sudo: Targeted Corruption of Register and Stack Variables
Resolves: RHEL-21821

* Wed Mar 15 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 1.9.5p2-9
- Rebuilt for MSVSphere 9.1.

* Thu Jan 19 2023 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-9
RHEL 9.2.0 ERRATUM
- CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user
Resolves: rhbz#2161225

* Wed Jan 11 2023 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-8
RHEL 9.2.0 ERRATUM
- sudo digest check fails incorrectly for certain file sizes (SHA512/SHA384)
Resolves: rhbz#2115789