- Issued:
- 2014-10-13
- Updated:
- 2014-10-13
RHBA-2014:1484 - Bug Fix Advisory
Synopsis
sudo bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated sudo packages that fix several bugs are now available for Red Hat
Enterprise Linux 6.
Description
The sudo packages contain the sudo utility which allows system administrators to
provide certain users with the permission to execute privileged commands, which
are used for system management purposes, without having to log in as root.
This update fixes the following bugs:
- Previously, the sudo utility did not correctly handle the "sudo -ll" command
when the System Security Service Daemon (SSSD) was used to get available sudo
entries. Consequently, running "sudo -ll" returned incomplete results, as it did
not list the rule names of sudo users. A patch has been applied to fix this bug,
and "sudo -ll" now lists the rule names as expected when SSSD is used.
(BZ#1006447)
- Prior to this update, sudo did not respond correctly to the root user's
request to list the privileges for a specified user when SSSD was used. As a
consequence, running the "sudo -l -U" command for a certain user as root
returned incomplete results, while running the same command as the user worked
as expected. The source code has been updated to fix this problem, and executing
"sudo -l -U" as root now returns correct results. (BZ#1006463)
- Previously, sudo did not correctly handle the situation when the group
specification in the /etc/sudoers file contained escape characters on systems
integrated with the Active Directory (AD) service. As a consequence, specifying
a custom password prompt for a group containing escape characters did not work,
as sudo displayed the default password prompt instead when a member of that
group used sudo. A patch has been applied to fix this bug, and setting a custom
password prompt now works as expected even if the group specification contains
escape characters. (BZ#1052940)
- Previously, the sesh process, when called as "-sesh" by sudo, executed the
login shell with an incorrect path name, as it replaced the last slash character
in the shell path with a dash while the rest of the path remained unchanged. As
a consequence, the login shell was being called as "/bin-[shell]" instead of
"-[shell]", which could result in unexpected system behavior. The source code
has been updated to fix this bug, and sesh no longer causes this problem.
(BZ#1065415)
- Previously, the pam_faillock module did not acknowledge the attempts to
terminate sudo login with the Ctrl+C shortcut after the password prompt showed
up. As a consequence, sudo continued to try to log in and eventually locked the
user out. The problem has been fixed, and even though an attempt terminated with
Ctrl+C still counts as one failed attempt to log in, sudo no longer locks the
user out. (BZ#1070952)
- Previously, sudo did not correctly handle setting the NIS domain name value as
"(none)", as it considered the "(none)" text string a valid domain name.
Consequently, the getdomainname() function returned "(none)" as the NIS domain
name instead of recognizing that no domain name was set. The source code has
been updated to fix this problem, and sudo now handles the described situation
correctly. (BZ#1078338)
- Prior to this update, when a sudo rule contained the +netgroup variable in the
sudoUser attribute, the system ignored the rest of the sudo rule under certain
circumstances. Consequently, executing the "sudo -l" command did not show the
complete list of rules configured for the specified user. With this update, the
problem has been fixed, and running "sudo -l" now shows the complete list of
rules even when a sudo rule contains the +netgroup variable. (BZ#1083064)
Users of sudo are advised to upgrade to these updated packages, which fix these
bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
Fixes
- BZ - 1006447 - sudo -ll does not list the rule names when sssd is used.
- BZ - 1006463 - sudo -U <user> listing shows incorrect list when sssd is used.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
x86_64 | |
sudo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: b1dd431c60d2a71144ed9518f23bc2b4d3117d5df1d1399dc05474a6f22d7d76 |
sudo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: b1dd431c60d2a71144ed9518f23bc2b4d3117d5df1d1399dc05474a6f22d7d76 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
sudo-devel-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 565f3d8e4da83ebdbcce114ee99b15dc9e1e8a913ff1a157f887b286822cbd82 |
sudo-devel-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 565f3d8e4da83ebdbcce114ee99b15dc9e1e8a913ff1a157f887b286822cbd82 |
i386 | |
sudo-1.8.6p3-15.el6.i686.rpm | SHA-256: 8d89d2e6bb1dcd31e2834aa1106a216fb22aaf0522fc0a4083355b791e5944d5 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
x86_64 | |
sudo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: b1dd431c60d2a71144ed9518f23bc2b4d3117d5df1d1399dc05474a6f22d7d76 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
sudo-devel-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 565f3d8e4da83ebdbcce114ee99b15dc9e1e8a913ff1a157f887b286822cbd82 |
i386 | |
sudo-1.8.6p3-15.el6.i686.rpm | SHA-256: 8d89d2e6bb1dcd31e2834aa1106a216fb22aaf0522fc0a4083355b791e5944d5 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
x86_64 | |
sudo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: b1dd431c60d2a71144ed9518f23bc2b4d3117d5df1d1399dc05474a6f22d7d76 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
sudo-devel-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 565f3d8e4da83ebdbcce114ee99b15dc9e1e8a913ff1a157f887b286822cbd82 |
i386 | |
sudo-1.8.6p3-15.el6.i686.rpm | SHA-256: 8d89d2e6bb1dcd31e2834aa1106a216fb22aaf0522fc0a4083355b791e5944d5 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
x86_64 | |
sudo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: b1dd431c60d2a71144ed9518f23bc2b4d3117d5df1d1399dc05474a6f22d7d76 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
sudo-devel-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 565f3d8e4da83ebdbcce114ee99b15dc9e1e8a913ff1a157f887b286822cbd82 |
i386 | |
sudo-1.8.6p3-15.el6.i686.rpm | SHA-256: 8d89d2e6bb1dcd31e2834aa1106a216fb22aaf0522fc0a4083355b791e5944d5 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
s390x | |
sudo-1.8.6p3-15.el6.s390x.rpm | SHA-256: d07c318a2296e2a1a75443596eb3b197b75703ddb6a97f02512e3670c4fcd4a5 |
sudo-debuginfo-1.8.6p3-15.el6.s390.rpm | SHA-256: 4baabcfce6134012b4704b1034a4e2dd0eb92b8ab465add53406998bcd223e6d |
sudo-debuginfo-1.8.6p3-15.el6.s390x.rpm | SHA-256: 7278e1d88a27803041989310ebeafb7ec9a7b700f8626a818da57f693e9602b5 |
sudo-debuginfo-1.8.6p3-15.el6.s390x.rpm | SHA-256: 7278e1d88a27803041989310ebeafb7ec9a7b700f8626a818da57f693e9602b5 |
sudo-devel-1.8.6p3-15.el6.s390.rpm | SHA-256: 3f0e2e26db87244236872c5647a2836d396c1fb15a0e98f9e5c052c7c7c83cc6 |
sudo-devel-1.8.6p3-15.el6.s390x.rpm | SHA-256: df75f344b10bd8690d6183a9dbc14f3dd417c21a8875c6889e8736a07c6fffa0 |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
ppc64 | |
sudo-1.8.6p3-15.el6.ppc64.rpm | SHA-256: 96b77d1bd98683ec95061761291b8089f18326050eeb8411f47d8e5c9119142c |
sudo-debuginfo-1.8.6p3-15.el6.ppc.rpm | SHA-256: 53fde824cfd128a924649872462a6823040faa1806a7cefecfe956020c79bbce |
sudo-debuginfo-1.8.6p3-15.el6.ppc64.rpm | SHA-256: 930ff72a6f58b8d3b36ce5405aff62bcb8007190e8d80e5a66b244b1270b785d |
sudo-debuginfo-1.8.6p3-15.el6.ppc64.rpm | SHA-256: 930ff72a6f58b8d3b36ce5405aff62bcb8007190e8d80e5a66b244b1270b785d |
sudo-devel-1.8.6p3-15.el6.ppc.rpm | SHA-256: fb39a77eacbb0d976a6f8fea4aabfdd2575ee68e8d57affd65ff8b7ffb5847fb |
sudo-devel-1.8.6p3-15.el6.ppc64.rpm | SHA-256: 0dbd4f0623e0f5341c787432787080a6404220009881450c7d50f098ac92dfbb |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
x86_64 | |
sudo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: b1dd431c60d2a71144ed9518f23bc2b4d3117d5df1d1399dc05474a6f22d7d76 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
sudo-devel-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 565f3d8e4da83ebdbcce114ee99b15dc9e1e8a913ff1a157f887b286822cbd82 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
x86_64 | |
sudo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: b1dd431c60d2a71144ed9518f23bc2b4d3117d5df1d1399dc05474a6f22d7d76 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
sudo-devel-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 565f3d8e4da83ebdbcce114ee99b15dc9e1e8a913ff1a157f887b286822cbd82 |
i386 | |
sudo-1.8.6p3-15.el6.i686.rpm | SHA-256: 8d89d2e6bb1dcd31e2834aa1106a216fb22aaf0522fc0a4083355b791e5944d5 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
s390x | |
sudo-1.8.6p3-15.el6.s390x.rpm | SHA-256: d07c318a2296e2a1a75443596eb3b197b75703ddb6a97f02512e3670c4fcd4a5 |
sudo-debuginfo-1.8.6p3-15.el6.s390.rpm | SHA-256: 4baabcfce6134012b4704b1034a4e2dd0eb92b8ab465add53406998bcd223e6d |
sudo-debuginfo-1.8.6p3-15.el6.s390x.rpm | SHA-256: 7278e1d88a27803041989310ebeafb7ec9a7b700f8626a818da57f693e9602b5 |
sudo-debuginfo-1.8.6p3-15.el6.s390x.rpm | SHA-256: 7278e1d88a27803041989310ebeafb7ec9a7b700f8626a818da57f693e9602b5 |
sudo-devel-1.8.6p3-15.el6.s390.rpm | SHA-256: 3f0e2e26db87244236872c5647a2836d396c1fb15a0e98f9e5c052c7c7c83cc6 |
sudo-devel-1.8.6p3-15.el6.s390x.rpm | SHA-256: df75f344b10bd8690d6183a9dbc14f3dd417c21a8875c6889e8736a07c6fffa0 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
x86_64 | |
sudo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: b1dd431c60d2a71144ed9518f23bc2b4d3117d5df1d1399dc05474a6f22d7d76 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-debuginfo-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 0c07de2bfd7ef2cbf99979112825e791c8948812d1fe470cc3c70e1d26a6284c |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
sudo-devel-1.8.6p3-15.el6.x86_64.rpm | SHA-256: 565f3d8e4da83ebdbcce114ee99b15dc9e1e8a913ff1a157f887b286822cbd82 |
i386 | |
sudo-1.8.6p3-15.el6.i686.rpm | SHA-256: 8d89d2e6bb1dcd31e2834aa1106a216fb22aaf0522fc0a4083355b791e5944d5 |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-debuginfo-1.8.6p3-15.el6.i686.rpm | SHA-256: 6aeb14d0b7918b5b157c1c633684564cc512c3cb5ad7c8c07031a00aa083250b |
sudo-devel-1.8.6p3-15.el6.i686.rpm | SHA-256: 2b20aa25eff4dca491124540019b565478a783f62ec87d4c3bf34bd6616a1c83 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6
SRPM | |
---|---|
sudo-1.8.6p3-15.el6.src.rpm | SHA-256: 93f0c4eb4bb44d5a8903ce1ba5708f1f1cb8efb51691c32a7fe80e0711a4dc4c |
s390x | |
sudo-1.8.6p3-15.el6.s390x.rpm | SHA-256: d07c318a2296e2a1a75443596eb3b197b75703ddb6a97f02512e3670c4fcd4a5 |
sudo-debuginfo-1.8.6p3-15.el6.s390.rpm | SHA-256: 4baabcfce6134012b4704b1034a4e2dd0eb92b8ab465add53406998bcd223e6d |
sudo-debuginfo-1.8.6p3-15.el6.s390x.rpm | SHA-256: 7278e1d88a27803041989310ebeafb7ec9a7b700f8626a818da57f693e9602b5 |
sudo-debuginfo-1.8.6p3-15.el6.s390x.rpm | SHA-256: 7278e1d88a27803041989310ebeafb7ec9a7b700f8626a818da57f693e9602b5 |
sudo-devel-1.8.6p3-15.el6.s390.rpm | SHA-256: 3f0e2e26db87244236872c5647a2836d396c1fb15a0e98f9e5c052c7c7c83cc6 |
sudo-devel-1.8.6p3-15.el6.s390x.rpm | SHA-256: df75f344b10bd8690d6183a9dbc14f3dd417c21a8875c6889e8736a07c6fffa0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.