- Issued:
- 2011-01-13
- Updated:
- 2011-01-13
RHBA-2011:0079 - Bug Fix Advisory
Synopsis
sudo bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated sudo package that fixes various bugs is now available for Red Hat
Enterprise Linux 5.
Description
The sudo (superuser do) utility allows system administrators to give certain
users the ability to run commands as root.
This update fixes the following bugs:
- Due to an incorrect definition of a lexical analyzer rule, using a negated
user-specific "Defaults" directive failed with a parse error. With this update,
such directives are now parsed as expected. (BZ#580438)
- Prior to this update, the manual page for sudoers.ldap was not installed, even
though it contains important information on how to set up an LDAP sudoers source
and other documents refer to it. This error no longer occurs, and the manual
page is now properly included in the package. Additionally, various POD files
have been removed from the package, as they are required for build purposes
only. (BZ#583644)
- A comment regarding the "visiblepw" option of the "Defaults" directive has
been added to the default /etc/sudoers file to clarify its usage. (BZ#583911)
- A typing error in the sudoers manual page has been corrected. (BZ#602022)
- When the /etc/sudoers file contained entries with multiple hosts, running the
"sudo -l" command incorrectly reported that a certain user does not have
permissions to use sudo on the system. With this update, the underlying source
code has been modified to target this issue, and running the "sudo -l" command
now produces the correct output. (BZ#603819)
- Due to an incorrect handling of mixed case in user and group names, fetching
the information from Active Directory may have failed with a cache error. With
this update, an upstream patch has been applied to target this issue, and sudo
now works as expected. (BZ#615179)
All users of sudo are advised to upgrade to this updated package, which resolves
these issues.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 580438 - Regression: sudoers parsing fails with Defaults_Type target including "!user"
- BZ - 583644 - .pod files are packaged under /usr/share/doc/sudo*, and man page for sudoers.ldap is missing
- BZ - 583683 - fix audit related code in configure.in (backport from Fedora)
- BZ - 583911 - Add comment about the visiblepw option into sudoers
- BZ - 602022 - sudoers(5) man page typo
- BZ - 603819 - sudo - fix printing of entries with multiple host entries on a single line.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
sudo-1.7.2p1-10.el5.src.rpm | SHA-256: a6e0b1e7e3745888ef86ae6347cc87b4e680d04c92a897e3884b6cea9554a44a |
x86_64 | |
sudo-1.7.2p1-10.el5.x86_64.rpm | SHA-256: 71dedf37e0b66a035a4cda8edca0714a35d7cacb6fef52f5c072f097bafffbc4 |
ia64 | |
sudo-1.7.2p1-10.el5.ia64.rpm | SHA-256: f541cc6e57d1bbe832a93004427b7abf53c5df9aaf11f30aa75a7bc9f50c2a89 |
i386 | |
sudo-1.7.2p1-10.el5.i386.rpm | SHA-256: b2919e1a6a16b1db9971609c4024d046a25d2bd096a8585803ce0c06a198b83f |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
sudo-1.7.2p1-10.el5.src.rpm | SHA-256: a6e0b1e7e3745888ef86ae6347cc87b4e680d04c92a897e3884b6cea9554a44a |
x86_64 | |
sudo-1.7.2p1-10.el5.x86_64.rpm | SHA-256: 71dedf37e0b66a035a4cda8edca0714a35d7cacb6fef52f5c072f097bafffbc4 |
i386 | |
sudo-1.7.2p1-10.el5.i386.rpm | SHA-256: b2919e1a6a16b1db9971609c4024d046a25d2bd096a8585803ce0c06a198b83f |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
sudo-1.7.2p1-10.el5.src.rpm | SHA-256: a6e0b1e7e3745888ef86ae6347cc87b4e680d04c92a897e3884b6cea9554a44a |
x86_64 | |
sudo-1.7.2p1-10.el5.x86_64.rpm | SHA-256: 71dedf37e0b66a035a4cda8edca0714a35d7cacb6fef52f5c072f097bafffbc4 |
i386 | |
sudo-1.7.2p1-10.el5.i386.rpm | SHA-256: b2919e1a6a16b1db9971609c4024d046a25d2bd096a8585803ce0c06a198b83f |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
sudo-1.7.2p1-10.el5.src.rpm | SHA-256: a6e0b1e7e3745888ef86ae6347cc87b4e680d04c92a897e3884b6cea9554a44a |
s390x | |
sudo-1.7.2p1-10.el5.s390x.rpm | SHA-256: a81bd6da3dfd706b35b1f087c71de63aaa252748e865f54c3c24c4b9ba2b7491 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
sudo-1.7.2p1-10.el5.src.rpm | SHA-256: a6e0b1e7e3745888ef86ae6347cc87b4e680d04c92a897e3884b6cea9554a44a |
ppc | |
sudo-1.7.2p1-10.el5.ppc.rpm | SHA-256: 73ec69a54a4672410e1e6310d993c20f73a480f90c336cdbaf2e4932d4b3f01b |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
sudo-1.7.2p1-10.el5.src.rpm | SHA-256: a6e0b1e7e3745888ef86ae6347cc87b4e680d04c92a897e3884b6cea9554a44a |
x86_64 | |
sudo-1.7.2p1-10.el5.x86_64.rpm | SHA-256: 71dedf37e0b66a035a4cda8edca0714a35d7cacb6fef52f5c072f097bafffbc4 |
i386 | |
sudo-1.7.2p1-10.el5.i386.rpm | SHA-256: b2919e1a6a16b1db9971609c4024d046a25d2bd096a8585803ce0c06a198b83f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.