Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:1409 - Security Advisory
Issued:
2015-07-22
Updated:
2015-07-22

RHSA-2015:1409 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: sudo security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated sudo packages that fix one security issue, three bugs, and add one
enhancement are now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The sudo packages contain the sudo utility which allows system
administrators to provide certain users with the permission to execute
privileged commands, which are used for system management purposes, without
having to log in as root.

It was discovered that sudo did not perform any checks of the TZ
environment variable value. If sudo was configured to preserve the TZ
environment variable, a local user with privileges to execute commands via
sudo could possibly use this flaw to achieve system state changes not
permitted by the configured commands. (CVE-2014-9680)

Note: The default sudoers configuration in Red Hat Enterprise Linux removes
the TZ variable from the environment in which commands run by sudo are
executed.

This update also fixes the following bugs:

  • Previously, the sudo utility child processes could sometimes become

unresponsive because they ignored the SIGPIPE signal. With this update,
SIGPIPE handler is properly restored in the function that reads passwords
from the user, and the child processes no longer ignore SIGPIPE. As a
result, sudo child processes do not hang in this situation. (BZ#1094548)

  • Prior to this update, the order in which sudo rules were processed did

not honor the user-defined sudoOrder attribute. Consequently, sudo rules
were processed in an undefined order even when the user defined the order
in sudoOrder. The implementation of SSSD support in sudo has been modified
to sort the rules according to the sudoOrder value, and sudo rules are now
sorted in the order defined by the user in sudoOrder. (BZ#1138581)

  • Previously, sudo became unresponsive after the user issued a command when

a sudoers source was mentioned multiple times in the /etc/nsswitch.conf
file. The problem occurred when nsswitch.conf contained, for example, the
"sudoers: files sss sss" entry. The sudoers source processing code has been
fixed to correctly handle multiple instances of the same sudoers source.
As a result, sudo no longer hangs when a sudoers source is mentioned
multiple times in /etc/nsswitch.conf. (BZ#1147498)

In addition, this update adds the following enhancement:

  • The sudo utility now supports I/O logs compressed using the zlib library.

With this update, sudo can generate zlib compressed I/O logs and also
process zlib compressed I/O logs generated by other versions of sudo with
zlib support. (BZ#1106433)

All sudo users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add this
enhancement.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 1138267 - sudoers.ldap man page has typos in description
  • BZ - 1138581 - sudo with sssd doesn't work correctly with sudoOrder option
  • BZ - 1142122 - sudo option mail_no_user doesn't work
  • BZ - 1144448 - sudo with ldap doesn't work correctly with 'listpw=all' and 'verifypw=all' in sudoOption entry
  • BZ - 1147498 - duplicate sss module in nsswitch breaks sudo
  • BZ - 1191144 - CVE-2014-9680 sudo: unsafe handling of TZ environment variable

CVEs

  • CVE-2014-9680

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
x86_64
sudo-1.8.6p3-19.el6.x86_64.rpm SHA-256: bef49717c1edf04fc0647a8d98de3b31d1bfe807268c734da5c22807021ae0a1
sudo-1.8.6p3-19.el6.x86_64.rpm SHA-256: bef49717c1edf04fc0647a8d98de3b31d1bfe807268c734da5c22807021ae0a1
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac
sudo-devel-1.8.6p3-19.el6.x86_64.rpm SHA-256: f088ad2ac43b9975a0ef37163a4d17193b81eed288546287171dc4879b2117d8
sudo-devel-1.8.6p3-19.el6.x86_64.rpm SHA-256: f088ad2ac43b9975a0ef37163a4d17193b81eed288546287171dc4879b2117d8
i386
sudo-1.8.6p3-19.el6.i686.rpm SHA-256: b8574a54c59ca53bd6efe0b569d0f070da1bc5872ec1dd900b0403e729164802
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac

Red Hat Enterprise Linux Workstation 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
x86_64
sudo-1.8.6p3-19.el6.x86_64.rpm SHA-256: bef49717c1edf04fc0647a8d98de3b31d1bfe807268c734da5c22807021ae0a1
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac
sudo-devel-1.8.6p3-19.el6.x86_64.rpm SHA-256: f088ad2ac43b9975a0ef37163a4d17193b81eed288546287171dc4879b2117d8
i386
sudo-1.8.6p3-19.el6.i686.rpm SHA-256: b8574a54c59ca53bd6efe0b569d0f070da1bc5872ec1dd900b0403e729164802
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac

Red Hat Enterprise Linux Desktop 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
i386
sudo-1.8.6p3-19.el6.i686.rpm SHA-256: b8574a54c59ca53bd6efe0b569d0f070da1bc5872ec1dd900b0403e729164802
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac
x86_64
sudo-1.8.6p3-19.el6.x86_64.rpm SHA-256: bef49717c1edf04fc0647a8d98de3b31d1bfe807268c734da5c22807021ae0a1
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac
sudo-devel-1.8.6p3-19.el6.x86_64.rpm SHA-256: f088ad2ac43b9975a0ef37163a4d17193b81eed288546287171dc4879b2117d8

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
s390x
sudo-1.8.6p3-19.el6.s390x.rpm SHA-256: 502761d2ff8425530c60ce7a4f24238f591c3b3703f7f704e5717c2c4347b774
sudo-debuginfo-1.8.6p3-19.el6.s390.rpm SHA-256: b94eb05400ae08d315fdef9cd83b73b0fcee7d57c8bd21fc906750d7464adb77
sudo-debuginfo-1.8.6p3-19.el6.s390x.rpm SHA-256: b6229289756fcab6d4eaede27cd8059208f7bc93ae90fffb8e944b97bf83d161
sudo-debuginfo-1.8.6p3-19.el6.s390x.rpm SHA-256: b6229289756fcab6d4eaede27cd8059208f7bc93ae90fffb8e944b97bf83d161
sudo-devel-1.8.6p3-19.el6.s390.rpm SHA-256: e74ab6590312f537bf62866fe1100ce24a34d5c96077387f14719ac55ff256bb
sudo-devel-1.8.6p3-19.el6.s390x.rpm SHA-256: 1b9be2d3eb830f50ff2a55acd12736d12a8132ce1079d23181d999cb2c5e8790

Red Hat Enterprise Linux for Power, big endian 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
ppc64
sudo-1.8.6p3-19.el6.ppc64.rpm SHA-256: 27b8b500b8fb38a7c518f0c66b511670cbf2d328793485e2c4a62e0f3c82c508
sudo-debuginfo-1.8.6p3-19.el6.ppc.rpm SHA-256: 5943fd3e11a6988287a7844ddc7e6cd0cbd58bc6001edea1851dd4fda39bbbf8
sudo-debuginfo-1.8.6p3-19.el6.ppc64.rpm SHA-256: 5f40d2cfb9da6088388b14c6adf4f9b35506ab9f1660a53047845a5fca64905e
sudo-debuginfo-1.8.6p3-19.el6.ppc64.rpm SHA-256: 5f40d2cfb9da6088388b14c6adf4f9b35506ab9f1660a53047845a5fca64905e
sudo-devel-1.8.6p3-19.el6.ppc.rpm SHA-256: 64adc5f44e41b1f47a428dd603e7cfe102ccced8556672d6490a86cb4409b275
sudo-devel-1.8.6p3-19.el6.ppc64.rpm SHA-256: cd2ac2723943a5ff5e288a2f80a32f146b8fa502ea3742aa11be83f36836d356

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
x86_64
sudo-1.8.6p3-19.el6.x86_64.rpm SHA-256: bef49717c1edf04fc0647a8d98de3b31d1bfe807268c734da5c22807021ae0a1
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac
sudo-devel-1.8.6p3-19.el6.x86_64.rpm SHA-256: f088ad2ac43b9975a0ef37163a4d17193b81eed288546287171dc4879b2117d8

Red Hat Enterprise Linux Server from RHUI 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
x86_64
sudo-1.8.6p3-19.el6.x86_64.rpm SHA-256: bef49717c1edf04fc0647a8d98de3b31d1bfe807268c734da5c22807021ae0a1
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac
sudo-devel-1.8.6p3-19.el6.x86_64.rpm SHA-256: f088ad2ac43b9975a0ef37163a4d17193b81eed288546287171dc4879b2117d8
i386
sudo-1.8.6p3-19.el6.i686.rpm SHA-256: b8574a54c59ca53bd6efe0b569d0f070da1bc5872ec1dd900b0403e729164802
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
x86_64
sudo-1.8.6p3-19.el6.x86_64.rpm SHA-256: bef49717c1edf04fc0647a8d98de3b31d1bfe807268c734da5c22807021ae0a1
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac
sudo-devel-1.8.6p3-19.el6.x86_64.rpm SHA-256: f088ad2ac43b9975a0ef37163a4d17193b81eed288546287171dc4879b2117d8
i386
sudo-1.8.6p3-19.el6.i686.rpm SHA-256: b8574a54c59ca53bd6efe0b569d0f070da1bc5872ec1dd900b0403e729164802
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
s390x
sudo-1.8.6p3-19.el6.s390x.rpm SHA-256: 502761d2ff8425530c60ce7a4f24238f591c3b3703f7f704e5717c2c4347b774
sudo-debuginfo-1.8.6p3-19.el6.s390.rpm SHA-256: b94eb05400ae08d315fdef9cd83b73b0fcee7d57c8bd21fc906750d7464adb77
sudo-debuginfo-1.8.6p3-19.el6.s390x.rpm SHA-256: b6229289756fcab6d4eaede27cd8059208f7bc93ae90fffb8e944b97bf83d161
sudo-debuginfo-1.8.6p3-19.el6.s390x.rpm SHA-256: b6229289756fcab6d4eaede27cd8059208f7bc93ae90fffb8e944b97bf83d161
sudo-devel-1.8.6p3-19.el6.s390.rpm SHA-256: e74ab6590312f537bf62866fe1100ce24a34d5c96077387f14719ac55ff256bb
sudo-devel-1.8.6p3-19.el6.s390x.rpm SHA-256: 1b9be2d3eb830f50ff2a55acd12736d12a8132ce1079d23181d999cb2c5e8790

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
x86_64
sudo-1.8.6p3-19.el6.x86_64.rpm SHA-256: bef49717c1edf04fc0647a8d98de3b31d1bfe807268c734da5c22807021ae0a1
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-debuginfo-1.8.6p3-19.el6.x86_64.rpm SHA-256: e46116f059a97afacbe0959e36bb717006c55abc9887de075a7033a2cc2d38dd
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac
sudo-devel-1.8.6p3-19.el6.x86_64.rpm SHA-256: f088ad2ac43b9975a0ef37163a4d17193b81eed288546287171dc4879b2117d8
i386
sudo-1.8.6p3-19.el6.i686.rpm SHA-256: b8574a54c59ca53bd6efe0b569d0f070da1bc5872ec1dd900b0403e729164802
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-debuginfo-1.8.6p3-19.el6.i686.rpm SHA-256: 09123c295adca40d87de47a9844f62ccb175df5353a4938e412c902da283a90b
sudo-devel-1.8.6p3-19.el6.i686.rpm SHA-256: 64964a9bc8acb01c6f7f260b6a72db3eaadf94169999995209d07f0a5b0812ac

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
sudo-1.8.6p3-19.el6.src.rpm SHA-256: c58ff2bb8a91af780b28fbba3ccaf0f1ca266226d802cbcc8b4fe4a7adf6c4db
s390x
sudo-1.8.6p3-19.el6.s390x.rpm SHA-256: 502761d2ff8425530c60ce7a4f24238f591c3b3703f7f704e5717c2c4347b774
sudo-debuginfo-1.8.6p3-19.el6.s390.rpm SHA-256: b94eb05400ae08d315fdef9cd83b73b0fcee7d57c8bd21fc906750d7464adb77
sudo-debuginfo-1.8.6p3-19.el6.s390x.rpm SHA-256: b6229289756fcab6d4eaede27cd8059208f7bc93ae90fffb8e944b97bf83d161
sudo-debuginfo-1.8.6p3-19.el6.s390x.rpm SHA-256: b6229289756fcab6d4eaede27cd8059208f7bc93ae90fffb8e944b97bf83d161
sudo-devel-1.8.6p3-19.el6.s390.rpm SHA-256: e74ab6590312f537bf62866fe1100ce24a34d5c96077387f14719ac55ff256bb
sudo-devel-1.8.6p3-19.el6.s390x.rpm SHA-256: 1b9be2d3eb830f50ff2a55acd12736d12a8132ce1079d23181d999cb2c5e8790

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility