Package sudo-1.9.5p2-10.el9_3.x86_64
Name | sudo |
---|---|
Epoch | 0 |
Version | 1.9.5p2 |
Release | 10.el9_3 |
Architecture | x86_64 |
Website/URL | https://www.sudo.ws |
License | ISC |
Build Time | 2024-02-15 13:21:20 |
Build Host | builder-x86-05.inferitos.ru |
Summary | Allows restricted root access for specified users |
Repositories | BaseOS |
Description | Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines. |
Errata | INFSA-2024:0811 |
Size | 1067 KiB |
Source Project | sudo-1.9.5p2-10.el9_3 |
SHA-256 checksum | a963943c5c78b8a8b148dc0ee81436adfce2c050f9686723ba34b0d1c06ed1a0 |
×
* Mon Jan 22 2024 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-10 RHEL 9.3.0.Z ERRATUM - CVE-2023-28487 sudo: Sudo does not escape control characters in sudoreplay output Resolves: RHEL-21834 - CVE-2023-28486 sudo: Sudo does not escape control characters in log messages Resolves: RHEL-21828 - CVE-2023-42465 sudo: Targeted Corruption of Register and Stack Variables Resolves: RHEL-21821 * Wed Mar 15 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 1.9.5p2-9 - Rebuilt for MSVSphere 9.1. * Thu Jan 19 2023 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-9 RHEL 9.2.0 ERRATUM - CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user Resolves: rhbz#2161225 * Wed Jan 11 2023 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-8 RHEL 9.2.0 ERRATUM - sudo digest check fails incorrectly for certain file sizes (SHA512/SHA384) Resolves: rhbz#2115789