Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2013:0112 - Bug Fix Advisory
Issued:
2013-01-07
Updated:
2013-01-07

RHBA-2013:0112 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

sudo bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated sudo packages that fix several bugs and add one enhancement are now
available for Red Hat Enterprise Linux 5.

Description

The sudo (superuser do) utility allows system administrators to give specific
users the ability to run commands as root.

This update fixes the following bugs:

  • Previously, sudo escaped non-alphanumeric characters in commands using "sudo
  • s" or "sudo -" at the wrong place and interfered with the authorization

process. Some valid commands were not permitted. Now, non-alphanumeric
characters are escaped immediately before the command is executed and no longer
interfere with the authorization process. (BZ#806073)

  • Prior to this update, the sudo utility could fail to receive the SIGCHLD

signal when it was executed from a process that blocked the SIGCHLD signal. As a
consequence, sudo could become suspended and fail to exit. This update modifies
the signal process mask so that sudo can exit and sends the correct output.
(BZ#814508)

  • The sudo update RHSA-2012:0309 introduced a regression that caused the SELinux

context of the /etc/nsswitch.conf file to change during installation or upgrade
of the sudo package. This could cause that various services confined by SELinux
were no longer permitted to access the file. In reported cases, this issue
prevented PostgreSQL and Postfix from starting. (BZ#818585)

  • Prior to this update, a race condition bug existed in sudo. When a program was

executed with sudo, it could exit successfully before sudo started waiting for
it. In this situation, the program became a defunct process and sudo waited for
it endlessly as it expected the program was still running. (BZ#829263)

  • The sudo update RHSA-2012:0309 changed the behavior of sudo; it now runs

commands as a child process instead of executing them directly and replacing the
running process. This change could cause errors in some external scripts. A new
cmnd_no_wait configuration option was added to restore the old behavior. To
apply this option, add the following line to the /etc/sudoers file:

Defaults cmnd_no_wait

(BZ#840971)

  • Updating the sudo package resulted in the "sudoers" line in /etc/nsswitch.conf

being removed. This update corrects the bug in the sudo package's post-uninstall
script that caused this issue. (BZ#841070)

  • The RHSA-2012:1149 sudo security update introduced a regression that caused

the permissions of the /etc/nsswitch.conf file to change during the installation
or upgrade of the sudo package. This could cause various services to be unable
to access the file. In reported cases, this bug prevented PostgreSQL from
starting. This update fixes the bug and the file's permissions are no longer
changed in the described scenario. (BZ#846631)

  • The policycoreutils package dependency, which includes the restorecon utility,

was set to Requires only. Consequently, the installation proceeded in the
incorrect order and restorecon was required before it was installed. This bug
has been fixed by using a context marked dependency "Requires(post)" and
"Requires(postun)", and the installation now proceeds correctly. (BZ#846694)

Also, this update adds the following enhancement:

  • The sudo utility is able to consult the /etc/nsswitch.conf file for sudoers

entries and look them up in files or in LDAP. Previously, when a match was found
in the first database of sudoers entries, the look-up operation still continued
in other databases. This update adds an option to the /etc/nsswitch.conf file
that allows specifying a database. Once a match was found in the specified
database, the search is finished. This eliminates the need to query any other
databases; thus, improving the performance of sudoers entry look ups in large
environments. This behavior is not enabled by default and must be configured by
adding the "[SUCCESS=return]" string after a selected database. When a match is
found in a database that directly precedes this string, no other databases are
queried. (BZ#840097)

All users of sudo are advised to upgrade to these updated packages, which fix
these bugs and add this enhancement.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 818585 - selinux blocks postgresql startup
  • BZ - 829263 - Sudo has racecondition leaving sudo with its zombie child running forever
  • BZ - 841070 - sudo 1.7.2p1-14.el5_8 removed sudoers line from nsswitch.conf
  • BZ - 846631 - Postgresql fail to start on RHEL 5.8

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
sudo-1.7.2p1-22.el5.src.rpm SHA-256: a2950c23715880a7f2409ab077b3f0de172511aa2b7b432839d55f33bfb3d2d0
x86_64
sudo-1.7.2p1-22.el5.x86_64.rpm SHA-256: 6c66fe6e6a9ddd653b8c63e6575098a3d39e5473be41755b45031a725f83038e
sudo-debuginfo-1.7.2p1-22.el5.x86_64.rpm SHA-256: bad0426919a7814bb6db74eee473b3c948427c606aba806401b15d4481aac3ab
ia64
sudo-1.7.2p1-22.el5.ia64.rpm SHA-256: 29df6da6285b562c17925bfdb46e928a03129fbb97330d6c78a760b011d4b184
sudo-debuginfo-1.7.2p1-22.el5.ia64.rpm SHA-256: f5d488fd910b0e2a75d67f9d14d0168f8eb36442ade0be871295b8d16c9e6d37
i386
sudo-1.7.2p1-22.el5.i386.rpm SHA-256: 4671d9f86de9854775b029db33f4b753e97633282dd71baa9b8b0c9d7f7f3097
sudo-debuginfo-1.7.2p1-22.el5.i386.rpm SHA-256: 94652a3b0c98dc72b2907ecdbbdbe62539c557ba9d67ab10df3a30bc2578bad2

Red Hat Enterprise Linux Workstation 5

SRPM
sudo-1.7.2p1-22.el5.src.rpm SHA-256: a2950c23715880a7f2409ab077b3f0de172511aa2b7b432839d55f33bfb3d2d0
x86_64
sudo-1.7.2p1-22.el5.x86_64.rpm SHA-256: 6c66fe6e6a9ddd653b8c63e6575098a3d39e5473be41755b45031a725f83038e
sudo-debuginfo-1.7.2p1-22.el5.x86_64.rpm SHA-256: bad0426919a7814bb6db74eee473b3c948427c606aba806401b15d4481aac3ab
i386
sudo-1.7.2p1-22.el5.i386.rpm SHA-256: 4671d9f86de9854775b029db33f4b753e97633282dd71baa9b8b0c9d7f7f3097
sudo-debuginfo-1.7.2p1-22.el5.i386.rpm SHA-256: 94652a3b0c98dc72b2907ecdbbdbe62539c557ba9d67ab10df3a30bc2578bad2

Red Hat Enterprise Linux Desktop 5

SRPM
sudo-1.7.2p1-22.el5.src.rpm SHA-256: a2950c23715880a7f2409ab077b3f0de172511aa2b7b432839d55f33bfb3d2d0
x86_64
sudo-1.7.2p1-22.el5.x86_64.rpm SHA-256: 6c66fe6e6a9ddd653b8c63e6575098a3d39e5473be41755b45031a725f83038e
sudo-debuginfo-1.7.2p1-22.el5.x86_64.rpm SHA-256: bad0426919a7814bb6db74eee473b3c948427c606aba806401b15d4481aac3ab
i386
sudo-1.7.2p1-22.el5.i386.rpm SHA-256: 4671d9f86de9854775b029db33f4b753e97633282dd71baa9b8b0c9d7f7f3097
sudo-debuginfo-1.7.2p1-22.el5.i386.rpm SHA-256: 94652a3b0c98dc72b2907ecdbbdbe62539c557ba9d67ab10df3a30bc2578bad2

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
sudo-1.7.2p1-22.el5.src.rpm SHA-256: a2950c23715880a7f2409ab077b3f0de172511aa2b7b432839d55f33bfb3d2d0
s390x
sudo-1.7.2p1-22.el5.s390x.rpm SHA-256: 97af86d065e9aa494f45d205ae1ac5f3d47dfb1b71124a45b8e4cdfe6b562d6a
sudo-debuginfo-1.7.2p1-22.el5.s390x.rpm SHA-256: 4f551ffdbde7f78d2cc1f275cb8ad8169cd819f27d30e3610c8eb9ba8049b26e

Red Hat Enterprise Linux for Power, big endian 5

SRPM
sudo-1.7.2p1-22.el5.src.rpm SHA-256: a2950c23715880a7f2409ab077b3f0de172511aa2b7b432839d55f33bfb3d2d0
ppc
sudo-1.7.2p1-22.el5.ppc.rpm SHA-256: a58cded993e88ccd92a34b263c6465369adcddac74394333e9bb903afcaf0ba5
sudo-debuginfo-1.7.2p1-22.el5.ppc.rpm SHA-256: 17209194b99e9013e6c799c46357271c73787fc8ee900dc3e91c8bbbf0d1977d

Red Hat Enterprise Linux Server from RHUI 5

SRPM
sudo-1.7.2p1-22.el5.src.rpm SHA-256: a2950c23715880a7f2409ab077b3f0de172511aa2b7b432839d55f33bfb3d2d0
x86_64
sudo-1.7.2p1-22.el5.x86_64.rpm SHA-256: 6c66fe6e6a9ddd653b8c63e6575098a3d39e5473be41755b45031a725f83038e
sudo-debuginfo-1.7.2p1-22.el5.x86_64.rpm SHA-256: bad0426919a7814bb6db74eee473b3c948427c606aba806401b15d4481aac3ab
i386
sudo-1.7.2p1-22.el5.i386.rpm SHA-256: 4671d9f86de9854775b029db33f4b753e97633282dd71baa9b8b0c9d7f7f3097
sudo-debuginfo-1.7.2p1-22.el5.i386.rpm SHA-256: 94652a3b0c98dc72b2907ecdbbdbe62539c557ba9d67ab10df3a30bc2578bad2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility