Пакет sudo-1.9.5p2-10.el9_6.1.x86_64
Имя | sudo |
---|---|
Эпоха | 0 |
Версия | 1.9.5p2 |
Релиз | 10.el9_6.1 |
Архитектура | x86_64 |
Сайт | https://www.sudo.ws |
Лицензия | ISC |
Время сборки | 2025-07-01 08:48:12 |
Хост сборки | builder-x86-05.inferitos.ru |
Краткое описание | Allows restricted root access for specified users |
Репозитории | BaseOS |
Полное описание | Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines. |
Эррата | INFSA-2025:9978 |
Размер | 1066 КиБ |
Исходный проект | sudo-1.9.5p2-10.el9_6.1 |
Контрольная сумма SHA-256 | 8de831a6443dddd945947c62815d6509aaaefa44cb679819338ac15ae2a06c16 |
×
* Wed Jun 25 2025 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-10.1 RHEL 9.6.0.Z ERRATUM - CVE-2025-32462 sudo: LPE via host option Resolves: RHEL-100016 * Mon Jan 22 2024 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-10 RHEL 9.3.0.Z ERRATUM - CVE-2023-28487 sudo: Sudo does not escape control characters in sudoreplay output Resolves: RHEL-21834 - CVE-2023-28486 sudo: Sudo does not escape control characters in log messages Resolves: RHEL-21828 - CVE-2023-42465 sudo: Targeted Corruption of Register and Stack Variables Resolves: RHEL-21821