Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:1081 - Security Advisory
Issued:
2012-07-16
Updated:
2012-07-16

RHSA-2012:1081 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: sudo security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated sudo package that fixes one security issue is now available for
Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root.

A flaw was found in the way the network matching code in sudo handled
multiple IP networks listed in user specification configuration directives.
A user, who is authorized to run commands with sudo on specific hosts,
could use this flaw to bypass intended restrictions and run those commands
on hosts not matched by any of the network specifications. (CVE-2012-2337)

All users of sudo are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 820677 - CVE-2012-2337 sudo: Multiple netmask values used in Host / Host_List configuration cause any host to be allowed access

CVEs

  • CVE-2012-2337

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • http://www.sudo.ws/sudo/alerts/netmask.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
x86_64
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc
i386
sudo-1.7.4p5-12.el6_3.i686.rpm SHA-256: c1a0fc674b93e4c0d48caf1b13396b31db84d77056675ed2bf49471274b2f48b
sudo-debuginfo-1.7.4p5-12.el6_3.i686.rpm SHA-256: 93dcab41fc708857c2b8b42f813b178570678e810219d5aa1275747d48527fd0

Red Hat Enterprise Linux Server 5

SRPM
sudo-1.7.2p1-14.el5_8.src.rpm SHA-256: 43135335c2384743089f97f6c31f282a6e5f431d7b02c5d4ed94986d496f3bda
x86_64
sudo-1.7.2p1-14.el5_8.x86_64.rpm SHA-256: b83783b48b69a5bb238ef3758cd63b213d6165cf776ab5c4ffcc2a397cb9606f
sudo-debuginfo-1.7.2p1-14.el5_8.x86_64.rpm SHA-256: e42fa2b8294cd27f0a21f988df27f40b642bb044a45c85a903a44a486743f97e
ia64
sudo-1.7.2p1-14.el5_8.ia64.rpm SHA-256: 6f586be7949321335fff72705fc2baea438785980cc099c9556b15975ebb4d8a
sudo-debuginfo-1.7.2p1-14.el5_8.ia64.rpm SHA-256: 995260dafeca1984177fa7f62d2b4fea0b4ec26c17f214de00395c0b8b4b253b
i386
sudo-1.7.2p1-14.el5_8.i386.rpm SHA-256: acadd22b966a58d39970bbb6c933f043aa7e2346603af484255d9e1142de11e7
sudo-debuginfo-1.7.2p1-14.el5_8.i386.rpm SHA-256: 0fdfb3685c7d050438ea72fea941ed807431f3ac1518b3c7f264c8e68708e5b9

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
x86_64
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc
i386
sudo-1.7.4p5-12.el6_3.i686.rpm SHA-256: c1a0fc674b93e4c0d48caf1b13396b31db84d77056675ed2bf49471274b2f48b
sudo-debuginfo-1.7.4p5-12.el6_3.i686.rpm SHA-256: 93dcab41fc708857c2b8b42f813b178570678e810219d5aa1275747d48527fd0

Red Hat Enterprise Linux Workstation 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
x86_64
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc
i386
sudo-1.7.4p5-12.el6_3.i686.rpm SHA-256: c1a0fc674b93e4c0d48caf1b13396b31db84d77056675ed2bf49471274b2f48b
sudo-debuginfo-1.7.4p5-12.el6_3.i686.rpm SHA-256: 93dcab41fc708857c2b8b42f813b178570678e810219d5aa1275747d48527fd0

Red Hat Enterprise Linux Workstation 5

SRPM
sudo-1.7.2p1-14.el5_8.src.rpm SHA-256: 43135335c2384743089f97f6c31f282a6e5f431d7b02c5d4ed94986d496f3bda
x86_64
sudo-1.7.2p1-14.el5_8.x86_64.rpm SHA-256: b83783b48b69a5bb238ef3758cd63b213d6165cf776ab5c4ffcc2a397cb9606f
sudo-debuginfo-1.7.2p1-14.el5_8.x86_64.rpm SHA-256: e42fa2b8294cd27f0a21f988df27f40b642bb044a45c85a903a44a486743f97e
i386
sudo-1.7.2p1-14.el5_8.i386.rpm SHA-256: acadd22b966a58d39970bbb6c933f043aa7e2346603af484255d9e1142de11e7
sudo-debuginfo-1.7.2p1-14.el5_8.i386.rpm SHA-256: 0fdfb3685c7d050438ea72fea941ed807431f3ac1518b3c7f264c8e68708e5b9

Red Hat Enterprise Linux Desktop 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
x86_64
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc
i386
sudo-1.7.4p5-12.el6_3.i686.rpm SHA-256: c1a0fc674b93e4c0d48caf1b13396b31db84d77056675ed2bf49471274b2f48b
sudo-debuginfo-1.7.4p5-12.el6_3.i686.rpm SHA-256: 93dcab41fc708857c2b8b42f813b178570678e810219d5aa1275747d48527fd0

Red Hat Enterprise Linux Desktop 5

SRPM
sudo-1.7.2p1-14.el5_8.src.rpm SHA-256: 43135335c2384743089f97f6c31f282a6e5f431d7b02c5d4ed94986d496f3bda
x86_64
sudo-1.7.2p1-14.el5_8.x86_64.rpm SHA-256: b83783b48b69a5bb238ef3758cd63b213d6165cf776ab5c4ffcc2a397cb9606f
sudo-debuginfo-1.7.2p1-14.el5_8.x86_64.rpm SHA-256: e42fa2b8294cd27f0a21f988df27f40b642bb044a45c85a903a44a486743f97e
i386
sudo-1.7.2p1-14.el5_8.i386.rpm SHA-256: acadd22b966a58d39970bbb6c933f043aa7e2346603af484255d9e1142de11e7
sudo-debuginfo-1.7.2p1-14.el5_8.i386.rpm SHA-256: 0fdfb3685c7d050438ea72fea941ed807431f3ac1518b3c7f264c8e68708e5b9

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
s390x
sudo-1.7.4p5-12.el6_3.s390x.rpm SHA-256: 13399969558b89d9f1731bafe1967962e7633297bdd0249e7231d4235ca00676
sudo-debuginfo-1.7.4p5-12.el6_3.s390x.rpm SHA-256: ee702babdf5402ec6eb68c7d7aa742dc117843ff59ed384f3081ee485169ef95

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
sudo-1.7.2p1-14.el5_8.src.rpm SHA-256: 43135335c2384743089f97f6c31f282a6e5f431d7b02c5d4ed94986d496f3bda
s390x
sudo-1.7.2p1-14.el5_8.s390x.rpm SHA-256: f9e315e313bf80539a4fa801a3068ab1885e95fcb69c80f01e42cc4a970339ad
sudo-debuginfo-1.7.2p1-14.el5_8.s390x.rpm SHA-256: defe2452ba4bdff62eec76944ea0d256d0bb00efbf9c538fa32577ca160c960b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
s390x
sudo-1.7.4p5-12.el6_3.s390x.rpm SHA-256: 13399969558b89d9f1731bafe1967962e7633297bdd0249e7231d4235ca00676
sudo-debuginfo-1.7.4p5-12.el6_3.s390x.rpm SHA-256: ee702babdf5402ec6eb68c7d7aa742dc117843ff59ed384f3081ee485169ef95

Red Hat Enterprise Linux for Power, big endian 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
ppc64
sudo-1.7.4p5-12.el6_3.ppc64.rpm SHA-256: d5304c38763e27ea3baa8d8a02a1745436b10424886341cbf319b02d22e21722
sudo-debuginfo-1.7.4p5-12.el6_3.ppc64.rpm SHA-256: 91c2b9653b152bbcbe15085b271d0df99802d1584d048169d6bf8468f6acaf81

Red Hat Enterprise Linux for Power, big endian 5

SRPM
sudo-1.7.2p1-14.el5_8.src.rpm SHA-256: 43135335c2384743089f97f6c31f282a6e5f431d7b02c5d4ed94986d496f3bda
ppc
sudo-1.7.2p1-14.el5_8.ppc.rpm SHA-256: 779f72f714170ca8aaefdabcf9b71e276a995e94ee10d62e20f744021d489ad9
sudo-debuginfo-1.7.2p1-14.el5_8.ppc.rpm SHA-256: fbd28850b1752aea708d046f91a083110f896949e031bb01b9cdd780f17aef92

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
ppc64
sudo-1.7.4p5-12.el6_3.ppc64.rpm SHA-256: d5304c38763e27ea3baa8d8a02a1745436b10424886341cbf319b02d22e21722
sudo-debuginfo-1.7.4p5-12.el6_3.ppc64.rpm SHA-256: 91c2b9653b152bbcbe15085b271d0df99802d1584d048169d6bf8468f6acaf81

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
x86_64
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc

Red Hat Enterprise Linux Server from RHUI 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
x86_64
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc
i386
sudo-1.7.4p5-12.el6_3.i686.rpm SHA-256: c1a0fc674b93e4c0d48caf1b13396b31db84d77056675ed2bf49471274b2f48b
sudo-debuginfo-1.7.4p5-12.el6_3.i686.rpm SHA-256: 93dcab41fc708857c2b8b42f813b178570678e810219d5aa1275747d48527fd0

Red Hat Enterprise Linux Server from RHUI 5

SRPM
sudo-1.7.2p1-14.el5_8.src.rpm SHA-256: 43135335c2384743089f97f6c31f282a6e5f431d7b02c5d4ed94986d496f3bda
x86_64
sudo-1.7.2p1-14.el5_8.x86_64.rpm SHA-256: b83783b48b69a5bb238ef3758cd63b213d6165cf776ab5c4ffcc2a397cb9606f
sudo-debuginfo-1.7.2p1-14.el5_8.x86_64.rpm SHA-256: e42fa2b8294cd27f0a21f988df27f40b642bb044a45c85a903a44a486743f97e
i386
sudo-1.7.2p1-14.el5_8.i386.rpm SHA-256: acadd22b966a58d39970bbb6c933f043aa7e2346603af484255d9e1142de11e7
sudo-debuginfo-1.7.2p1-14.el5_8.i386.rpm SHA-256: 0fdfb3685c7d050438ea72fea941ed807431f3ac1518b3c7f264c8e68708e5b9

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
x86_64
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc
i386
sudo-1.7.4p5-12.el6_3.i686.rpm SHA-256: c1a0fc674b93e4c0d48caf1b13396b31db84d77056675ed2bf49471274b2f48b
sudo-debuginfo-1.7.4p5-12.el6_3.i686.rpm SHA-256: 93dcab41fc708857c2b8b42f813b178570678e810219d5aa1275747d48527fd0

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
s390x
sudo-1.7.4p5-12.el6_3.s390x.rpm SHA-256: 13399969558b89d9f1731bafe1967962e7633297bdd0249e7231d4235ca00676
sudo-debuginfo-1.7.4p5-12.el6_3.s390x.rpm SHA-256: ee702babdf5402ec6eb68c7d7aa742dc117843ff59ed384f3081ee485169ef95

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
x86_64
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc
i386
sudo-1.7.4p5-12.el6_3.i686.rpm SHA-256: c1a0fc674b93e4c0d48caf1b13396b31db84d77056675ed2bf49471274b2f48b
sudo-debuginfo-1.7.4p5-12.el6_3.i686.rpm SHA-256: 93dcab41fc708857c2b8b42f813b178570678e810219d5aa1275747d48527fd0

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
x86_64
sudo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 600eeac31518884396da6eb6ff8c73ad2766b263054f5504e2b4b1aae99150b0
sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm SHA-256: 3d9ee2c6e3fe10d9e5f3ae83772461cf7ca1663a89e97be7c699d3bebad4b9bc
i386
sudo-1.7.4p5-12.el6_3.i686.rpm SHA-256: c1a0fc674b93e4c0d48caf1b13396b31db84d77056675ed2bf49471274b2f48b
sudo-debuginfo-1.7.4p5-12.el6_3.i686.rpm SHA-256: 93dcab41fc708857c2b8b42f813b178570678e810219d5aa1275747d48527fd0

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
sudo-1.7.4p5-12.el6_3.src.rpm SHA-256: c6f13d87f95d71561cd9bfc793698cb11cdec64cf9e85a156dcc2f1c6072a889
s390x
sudo-1.7.4p5-12.el6_3.s390x.rpm SHA-256: 13399969558b89d9f1731bafe1967962e7633297bdd0249e7231d4235ca00676
sudo-debuginfo-1.7.4p5-12.el6_3.s390x.rpm SHA-256: ee702babdf5402ec6eb68c7d7aa742dc117843ff59ed384f3081ee485169ef95

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility