- Issued:
- 2012-06-20
- Updated:
- 2012-06-20
RHBA-2012:0905 - Bug Fix Advisory
Synopsis
sudo bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated sudo packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 6.
Description
The sudo packages provide the superuser do (sudo) utility, which allows system
administrators to give certain users the ability to run commands as root.
This update fixes the following bugs:
- Previously, the "-c" check used a very restrictive policy and "visudo -s"
treated unused aliases as errors. This update modifies this behavior and "visudo
- s" only warns about unused aliases. (BZ#604297)
- Previously, core dumping in sudo was disabled in the code. Administrators
could not control the core dumping. This update modifies the code so that core
dumping is no any longer disabled. Now, administrators can control core dumping
in sudo, which is a SUID binary, using the /proc/sys/fs/suid_dumpable file.
(BZ#667120)
- Previously, the "sudoedit" used the wrong SELinux context when manipulating
files. Files could not be edited when SELinux was in enforcing mode, if the
sudoers rule specified a SELinux context that permitted sudoedit. This update
modifies the code to permit a transition to the correct SELinux context. Now,
files can be edited using the correct SELinux context. (BZ#697775)
- Previously, the alias checking code in sudo caused false negatives and
positives. Syntactically correct sudoers files were declared to be erroneous and
unused aliases were not detected. This update modifies the checking code to
eliminate false positives and negatives. (BZ#751680)
Previously, The nslcd service could not be started if the nscld.conf file
contained sudo specific configuration directives. The nslcd daemon could not run
while the LDAP sudoers sources were configured. This update uses the separate
sudo-ldap config file for configuring LDAP sudoers sources. (BZ#760843)
- Previously, sudo could handle signals incorrectly if the SIGCHLD signal was
received immediately before the select()call and the sudo process became
unresponsive after receiving the SIGCHLD signal. This update modifies the
underlying code to improve the signal handling. (BZ#769701)
- Previously, the getgrouplist() function checked the invoker's group membership
instead of the membership of the specified user. As a Consequence, sudo listed
privileges granted to any group the invoking user was a member of when
attempting to view all allowed and forbidden commands both for the invoking user
with the "-l" option and for users specified by the "-U" option. This update
modifies the getgrouplist() function to correctly check the group membership of
the intended user. (BZ#797511)
- Previously, sudo escaped non-aplhanumeric characters in commands using "sudo
- s" or "sudo -" at the wrong place and interfered with the authorization
process. Some valid commands were not permitted. Now, non-aplhanumeric
characters escape immediately before the command is executed and no longer
interfere with the authorization process. (BZ#806095)
- Previously, the sudo tool interpreted a Runas alias that specified a group
incorrectly as a user alias. As a consequencee, the alias appeared to be
ignored. This update modifies the code to interprete these aliases and the Runas
group aliases are honored as expected. (BZ#810147)
- Previously, the sudo word wrapping feature caused output to be wrapped at
terminal width boundary even in output that was piped to an other command. This
update modifies the underlying code to detect whether the output is a pipe and
disables the word wrapping feature in this case. (BZ#810326)
- Previously, the "tls_checkpeer" option was set on a handle that is not used
when connecting to the Lightweight Directory Access Protocol (LDAP) server. The
"tls_checkpeer" option could not be disabled. This update modifies the
underlying code so that the option can now be disabled. (BZ#810372)
All users of sudo are advised to upgrade to this updated package, which fix
these bugs.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
Fixes
- BZ - 697775 - AVCs and sudoedit: mkstemps: Permission denied
- BZ - 708515 - fails to build without downstream patches
- BZ - 726634 - sudoers(5) man page typo
- BZ - 736653 - README.LDAP is not updated with nslcd.conf
- BZ - 760843 - nslcd.conf incompatible with sudo config
- BZ - 797511 - "sudo -l -U user" may show incorrect privileges for specified user
- BZ - 806386 - Uninitialized return value in 'sudo' package.
- BZ - 810147 - The Runas_Spec are ignored in sudoers file
- BZ - 810326 - sudo -l inserts new lines based on terminal width, causing errors when output is piped.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
x86_64 | |
sudo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: b7d5c1f89f6250a8f98f4f50678bdb92e905b0a9e0c4d0125a50e0978dcdfb24 |
sudo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: b7d5c1f89f6250a8f98f4f50678bdb92e905b0a9e0c4d0125a50e0978dcdfb24 |
sudo-debuginfo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: 8d5ddc6fec1a18ed2e5aa7581491f7ded54faac854d91e0ed61419664ab2db8f |
sudo-debuginfo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: 8d5ddc6fec1a18ed2e5aa7581491f7ded54faac854d91e0ed61419664ab2db8f |
i386 | |
sudo-1.7.4p5-11.el6.i686.rpm | SHA-256: 9a8b5c7b6145e30cd9630b3c36beacebe25668e64b924b445a8acc423ba85d71 |
sudo-debuginfo-1.7.4p5-11.el6.i686.rpm | SHA-256: d243a9c0bf4804e9e7f2de8df26fa2ccf9bc0af3332c8ab799d07ee65b2be1b6 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
x86_64 | |
sudo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: b7d5c1f89f6250a8f98f4f50678bdb92e905b0a9e0c4d0125a50e0978dcdfb24 |
sudo-debuginfo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: 8d5ddc6fec1a18ed2e5aa7581491f7ded54faac854d91e0ed61419664ab2db8f |
i386 | |
sudo-1.7.4p5-11.el6.i686.rpm | SHA-256: 9a8b5c7b6145e30cd9630b3c36beacebe25668e64b924b445a8acc423ba85d71 |
sudo-debuginfo-1.7.4p5-11.el6.i686.rpm | SHA-256: d243a9c0bf4804e9e7f2de8df26fa2ccf9bc0af3332c8ab799d07ee65b2be1b6 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
x86_64 | |
sudo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: b7d5c1f89f6250a8f98f4f50678bdb92e905b0a9e0c4d0125a50e0978dcdfb24 |
sudo-debuginfo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: 8d5ddc6fec1a18ed2e5aa7581491f7ded54faac854d91e0ed61419664ab2db8f |
i386 | |
sudo-1.7.4p5-11.el6.i686.rpm | SHA-256: 9a8b5c7b6145e30cd9630b3c36beacebe25668e64b924b445a8acc423ba85d71 |
sudo-debuginfo-1.7.4p5-11.el6.i686.rpm | SHA-256: d243a9c0bf4804e9e7f2de8df26fa2ccf9bc0af3332c8ab799d07ee65b2be1b6 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
x86_64 | |
sudo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: b7d5c1f89f6250a8f98f4f50678bdb92e905b0a9e0c4d0125a50e0978dcdfb24 |
sudo-debuginfo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: 8d5ddc6fec1a18ed2e5aa7581491f7ded54faac854d91e0ed61419664ab2db8f |
i386 | |
sudo-1.7.4p5-11.el6.i686.rpm | SHA-256: 9a8b5c7b6145e30cd9630b3c36beacebe25668e64b924b445a8acc423ba85d71 |
sudo-debuginfo-1.7.4p5-11.el6.i686.rpm | SHA-256: d243a9c0bf4804e9e7f2de8df26fa2ccf9bc0af3332c8ab799d07ee65b2be1b6 |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
s390x | |
sudo-1.7.4p5-11.el6.s390x.rpm | SHA-256: 2065d18fab3937ef76a8d93f8d57ba50e10c75fe015139f705f657cf1414aab2 |
sudo-debuginfo-1.7.4p5-11.el6.s390x.rpm | SHA-256: 4397ea3d34a8da7f29a6d66aad5dbc6a4fbe5322448f39b711f053d7decac098 |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
ppc64 | |
sudo-1.7.4p5-11.el6.ppc64.rpm | SHA-256: 42d9bdb10860ad83de76559d84dc86ebfeedfbbbedeefff81a2fd682d861d010 |
sudo-debuginfo-1.7.4p5-11.el6.ppc64.rpm | SHA-256: 741de8065d04ddee9c1b3f0ec06759ff1d083fb4e24e3167b35b4d317eea4cb5 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
x86_64 | |
sudo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: b7d5c1f89f6250a8f98f4f50678bdb92e905b0a9e0c4d0125a50e0978dcdfb24 |
sudo-debuginfo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: 8d5ddc6fec1a18ed2e5aa7581491f7ded54faac854d91e0ed61419664ab2db8f |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
x86_64 | |
sudo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: b7d5c1f89f6250a8f98f4f50678bdb92e905b0a9e0c4d0125a50e0978dcdfb24 |
sudo-debuginfo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: 8d5ddc6fec1a18ed2e5aa7581491f7ded54faac854d91e0ed61419664ab2db8f |
i386 | |
sudo-1.7.4p5-11.el6.i686.rpm | SHA-256: 9a8b5c7b6145e30cd9630b3c36beacebe25668e64b924b445a8acc423ba85d71 |
sudo-debuginfo-1.7.4p5-11.el6.i686.rpm | SHA-256: d243a9c0bf4804e9e7f2de8df26fa2ccf9bc0af3332c8ab799d07ee65b2be1b6 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
s390x | |
sudo-1.7.4p5-11.el6.s390x.rpm | SHA-256: 2065d18fab3937ef76a8d93f8d57ba50e10c75fe015139f705f657cf1414aab2 |
sudo-debuginfo-1.7.4p5-11.el6.s390x.rpm | SHA-256: 4397ea3d34a8da7f29a6d66aad5dbc6a4fbe5322448f39b711f053d7decac098 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
x86_64 | |
sudo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: b7d5c1f89f6250a8f98f4f50678bdb92e905b0a9e0c4d0125a50e0978dcdfb24 |
sudo-debuginfo-1.7.4p5-11.el6.x86_64.rpm | SHA-256: 8d5ddc6fec1a18ed2e5aa7581491f7ded54faac854d91e0ed61419664ab2db8f |
i386 | |
sudo-1.7.4p5-11.el6.i686.rpm | SHA-256: 9a8b5c7b6145e30cd9630b3c36beacebe25668e64b924b445a8acc423ba85d71 |
sudo-debuginfo-1.7.4p5-11.el6.i686.rpm | SHA-256: d243a9c0bf4804e9e7f2de8df26fa2ccf9bc0af3332c8ab799d07ee65b2be1b6 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6
SRPM | |
---|---|
sudo-1.7.4p5-11.el6.src.rpm | SHA-256: 7daf45688c2a3c8d00ac886ff8a1a17d8affb87badaab6a1a963f84d2208b315 |
s390x | |
sudo-1.7.4p5-11.el6.s390x.rpm | SHA-256: 2065d18fab3937ef76a8d93f8d57ba50e10c75fe015139f705f657cf1414aab2 |
sudo-debuginfo-1.7.4p5-11.el6.s390x.rpm | SHA-256: 4397ea3d34a8da7f29a6d66aad5dbc6a4fbe5322448f39b711f053d7decac098 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.