Name: | sudo |
---|---|
Version: | 1.8.23 |
Release: | 10.el7_9.3 |
Architecture: | aarch64 |
Group: | Applications/System |
Size: | 3637897 |
License: | ISC |
RPM: | sudo-1.8.23-10.el7_9.3.aarch64.rpm |
Source RPM: | sudo-1.8.23-10.el7_9.3.src.rpm |
Build Date: | Mon Jan 23 2023 |
Build Host: | build-ol7-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.courtesan.com/sudo/ |
Summary: | Allows restricted root access for specified users |
Description: | Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines. |
RHEL 7.9.Z ERRATUM - CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user Resolves: rhbz#2161222
- RHEL 7.9.Z ERRATUM - defaults use_pty plus SELinux ROLE in user specification breaks terminal Resolves: rhbz#1972820
- RHEL 7.9.Z ERRATUM - CVE-2021-3156 Resolves: rhbz#1917729
- RHEL-7.9 - sudo allows privilege escalation with expire password Resolves: rhbz#1788196
- RHEL-7.8 - CVE-2019-18634 Resolves: rhbz#1798095
- RHEL-7.8 - fixed CVE-2019-14287 Resolves: rhbz#1760695
- RHEL-7.8 erratum Resolves: rhbz#1738841 Crash in do_syslog() while doing sudoedit
- RHEL-7.8 erratum Resolves: rhbz#1647678 sudo access denied with pam_access and pts terminal configurations
- RHEL-7.8 erratum Resolves: rhbz#1711997 sudo is super slow when /etc/security/limits.conf contains many entries
- RHEL-7.7 erratum Resolves: rhbz#1672876 - Backporting sudo bug with expired passwords Resolves: rhbz#1665285 - Problem with sudo-1.8.23 and 'who am i'