Jump to letter: [
3ABCDEFGHIJKLMNOPQRSTUVWXYZ
]
sudo - Allows restricted root access for specified users
- Description:
Sudo (superuser do) allows a system administrator to give certain
users (or groups of users) the ability to run some (or all) commands
as root while logging all commands and arguments. Sudo operates on a
per-command basis. It is not a replacement for the shell. Features
include: the ability to restrict what commands a user may run on a
per-host basis, copious logging of each command (providing a clear
audit trail of who did what), a configurable timeout of the sudo
command, and the ability to use the same configuration file (sudoers)
on many different machines.
Packages
sudo-1.8.23-10.el7_9.3.x86_64
[782 KiB] |
Changelog
by Radovan Sroka (2023-01-11):
RHEL 7.9.Z ERRATUM
- CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user
Resolves: rhbz#2161222
|
sudo-1.8.23-10.el7_9.1.x86_64
[780 KiB] |
Changelog
by Radovan Sroka (2021-01-20):
- RHEL 7.9.Z ERRATUM
- CVE-2021-3156
Resolves: rhbz#1917729
|
sudo-1.8.23-4.el7_7.2.x86_64
[781 KiB] |
Changelog
by Radovan Sroka (2020-02-06):
- RHEL 7.7.z
- fixed CVE-2019-18634
Resolves: rhbz#1798094
|
sudo-1.8.23-4.el7_7.1.x86_64
[781 KiB] |
Changelog
by Radovan Sroka (2019-10-16):
- RHEL-7.7.z
- fixed CVE-2019-14287
Resolves: rhbz#1760694
|
sudo-1.8.6p7-23.el7_3.x86_64
[734 KiB] |
Changelog
by Daniel Kopecek (2017-06-07):
- Fixes CVE-2017-1000367
Resolves: rhbz#1459410
|
sudo-1.8.6p7-22.el7_3.x86_64
[734 KiB] |
Changelog
by Radovan Sroka (2017-05-29):
- Fixes CVE-2017-1000367 sudo: Privilege escalation in via improper get_process_ttyname() parsing [rhel-7.3.z]
Resolves: rhbz#1455401
|
sudo-1.8.6p7-21.el7_3.x86_64
[733 KiB] |
Changelog
by Daniel Kopecek (2016-11-23):
- Update noexec syscall blacklist
- Fixes CVE-2016-7032 and CVE-2016-7076
Resolves: rhbz#1391939
|
sudo-1.8.6p7-20.el7.x86_64
[734 KiB] |
Changelog
by Daniel Kopecek (2016-07-19):
- RHEL 7.3 erratum
- fixed visudo's -q flag
Resolves: rhbz#1350828
|