Package sudo-1.9.5p2-13.el9.x86_64
| Name | sudo |
|---|---|
| Epoch | 0 |
| Version | 1.9.5p2 |
| Release | 13.el9 |
| Architecture | x86_64 |
| Website/URL | https://www.sudo.ws |
| License | ISC |
| Build Time | 2025-10-23 20:46:21 |
| Build Host | builder-x86-03.inferitos.ru |
| Summary | Allows restricted root access for specified users |
| Repositories | BaseOS |
| Description | Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines. |
| Errata | — |
| Size | 1066 KiB |
| Source Project | sudo-1.9.5p2-13.el9 |
| SHA-256 checksum | 9cae001f0e439ab5dfd7acf453e9381d92989ded92f5a100114a680cb181232d |
×
* Fri Apr 25 2025 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-13 RHEL: 9.7.0 ERRATUM - sudo missing spacing and separator in log when using "--preserve-env=list" Resolves: RHEL-71916 - CVE-2025-32462 sudo: LPE via host option Resolves: RHEL-100020 * Mon Jan 22 2024 Radovan Sroka <rsroka@redhat.com> - 1.9.5p2-10 RHEL 9.3.0.Z ERRATUM - CVE-2023-28487 sudo: Sudo does not escape control characters in sudoreplay output Resolves: RHEL-21834 - CVE-2023-28486 sudo: Sudo does not escape control characters in log messages Resolves: RHEL-21828 - CVE-2023-42465 sudo: Targeted Corruption of Register and Stack Variables Resolves: RHEL-21821