Пакет sudo-1.9.5p2-1.el8_10.1.src
Имя | sudo |
---|---|
Эпоха | 0 |
Версия | 1.9.5p2 |
Релиз | 1.el8_10.1 |
Архитектура | src |
Сайт | https://www.sudo.ws/ |
Лицензия | ISC |
Время сборки | 2025-07-02 09:04:09 |
Хост сборки | builder-x86-04.inferitos.ru |
Краткое описание | Allows restricted root access for specified users |
Репозитории | BaseOS |
Полное описание | Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines. |
Эррата | — |
Размер | 3998 КиБ |
Исходный проект | sudo-1.9.5p2-1.el8_10.1 |
Контрольная сумма SHA-256 | b1feb855e4b5d7666bd51ced6edaad19398d35725b0eeee8a020b0f36479682f |
×
* Wed Jun 25 2025 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-10.1 RHEL 8.10.0.Z ERRATUM - CVE-2025-32462 sudo: LPE via host option Resolves: RHEL-100014 * Mon Jan 22 2024 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-1 RHEL 8.9.0.Z ERRATUM - Rebase to 1.9.5p2 - CVE-2023-28486 sudo: Sudo does not escape control characters in log messages Resolves: RHEL-21825 - CVE-2023-28487 sudo: Sudo does not escape control characters in sudoreplay output Resolves: RHEL-21831 - CVE-2023-42465 sudo: Targeted Corruption of Register and Stack Variables Resolves: RHEL-21820 * Wed Jul 26 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 1.8.29.9 - Rebuilt for MSVSphere 8.8 * Wed Jan 11 2023 Radovan Sroka <rsroka@redhat.com> - 1.8.29.9 RHEL 8.8.0 ERRATUM - CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user Resolves: rhbz#2161221 - sudo digest check fails incorrectly for certain file sizes (SHA512/SHA384) Resolves: rhbz#2114576 * Mon Dec 06 2021 Radovan Sroka <rsroka@redhat.com> - 1.8.29-8 RHEL 8.6.0 ERRATUM - sudoedit does not work with selinux args Resolves: rhbz#2029551 - Make sure SIGCHLD is not ignored when sudo is executed Resolves: rhbz#1999751 - [RFE] pass KRB5CCNAME to pam_authenticate environment if available Resolves: rhbz#1917379 - utmp resource leak in sudo Resolves: rhbz#1986572 * Tue Feb 02 2021 Radovan Sroka <rsroka@redhat.com> - 1.8.29-7 - RHEL 8.4 ERRATUM - CVE-2021-3156 Resolves: rhbz#1917734 - CVE-2021-23239 sudo: possible directory existence test due to race condition in sudoedit Resolves: rhzb#1916434 - CVE-2021-23240 sudo: symbolic link attack in SELinux-enabled sudoedit Resolves: rhbz#1917038 - updated upstream url Resolves: rhbz#1923825 * Tue Apr 28 2020 Radovan Sroka <rsroka@redhat.com> - 1.8.29-6 - RHEL 8.3 ERRATUM - sudo allows privilege escalation with expire password Resolves: rhbz#1815164 * Wed Feb 05 2020 Radovan Sroka <rsroka@redhat.com> - 1.8.29-5 - RHEL 8.2 ERRATUM - CVE-2019-18634 Resolves: rhbz#1798093 * Tue Jan 14 2020 Radovan Sroka <rsroka@redhat.com> - 1.8.29-4 - RHEL 8.2 ERRATUM - CVE-2019-19232 Resolves: rhbz#1786987 Resolves: rhbz#1796518 * Wed Oct 30 2019 Radovan Sroka <rsroka@redhat.com> - 1.8.29-2 - RHEL 8.2 ERRATUM - rebase to 1.8.29 Resolves: rhbz#1733961 Resolves: rhbz#1651662