Skip to navigation

Bug Fix Advisory sudo bug fix update

Advisory: RHBA-2012:0565-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-05-10
Last updated on: 2012-05-10
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated sudo packages that fix two bugs are now available for Red Hat Enterprise
Linux 6.

The sudo (superuser do) utility allows system administrators to give certain
users the ability to run commands as root.

This update fixes the following bugs:

* A race condition in the signal handling code caused the sudo process to become
unresponsive after receiving the SIGCHLD signal. This update modifies the signal
handling to prevent the race condition, which ensures that the sudo process no
longer hangs under these circumstances. (BZ#802440)

* The "-l" option is used to list allowed and forbidden commands for the
invoking user or for the user specified by the "-U" option. However, previously,
the getgrouplist() function incorrectly checked the invoker's group membership
instead of the membership of the specified user. Consequently, using the "sudo"
command with both the "-l" and "-U" options listed privileges granted to any
group the invoker was a member of. The getgrouplist() function has been fixed to
properly check the group membership of the intended user rather than checking
the invoker's membership. This ensures that the required output is listed when
using the "-l" and "-U options. (BZ#811879)

All users of sudo are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
sudo-1.7.4p5-9.el6_2.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: a099e589cca7bbb769f1dbcc684589b8
SHA-256: e24fac970c7f264923ab00d726dbeee681d2b9d6988a41897608393bdf2f0a6f
 
IA-32:
sudo-1.7.4p5-9.el6_2.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: 52ed597b27715cc04eaab1baf1d7a118
SHA-256: fa4fa7941f416c373b63c27d43fd919402fb29c3413245572becb6d0b647c2ea
sudo-debuginfo-1.7.4p5-9.el6_2.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: 62df1bc597247480ab168d44f895a55e
SHA-256: 9d3101c8b794f37133c026d88816a0abccc345919c3e49d232f97b3ee579b6ba
 
x86_64:
sudo-1.7.4p5-9.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: bf05c6bcf07f44b95bef7f9b909017bb
SHA-256: d065f0a1395435e804441631758025a16d5c55e9555d3fa567543617e377f031
sudo-debuginfo-1.7.4p5-9.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 6921f52b37dde593a2e6554f0218f7ab
SHA-256: 46403f5acffcb7ab50ffb5e530b031034acd0771be364c82c4e25386c48c33ac
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
sudo-1.7.4p5-9.el6_2.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: a099e589cca7bbb769f1dbcc684589b8
SHA-256: e24fac970c7f264923ab00d726dbeee681d2b9d6988a41897608393bdf2f0a6f
 
x86_64:
sudo-1.7.4p5-9.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: bf05c6bcf07f44b95bef7f9b909017bb
SHA-256: d065f0a1395435e804441631758025a16d5c55e9555d3fa567543617e377f031
sudo-debuginfo-1.7.4p5-9.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 6921f52b37dde593a2e6554f0218f7ab
SHA-256: 46403f5acffcb7ab50ffb5e530b031034acd0771be364c82c4e25386c48c33ac
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
sudo-1.7.4p5-9.el6_2.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: a099e589cca7bbb769f1dbcc684589b8
SHA-256: e24fac970c7f264923ab00d726dbeee681d2b9d6988a41897608393bdf2f0a6f
 
IA-32:
sudo-1.7.4p5-9.el6_2.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: 52ed597b27715cc04eaab1baf1d7a118
SHA-256: fa4fa7941f416c373b63c27d43fd919402fb29c3413245572becb6d0b647c2ea
sudo-debuginfo-1.7.4p5-9.el6_2.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: 62df1bc597247480ab168d44f895a55e
SHA-256: 9d3101c8b794f37133c026d88816a0abccc345919c3e49d232f97b3ee579b6ba
 
PPC:
sudo-1.7.4p5-9.el6_2.ppc64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 49faf4aa2a969179b7a88ec8bd64aeea
SHA-256: ef45cf6de6d4330440984bf5ee2a32954a76de5674d6e869a174d508a47db7bc
sudo-debuginfo-1.7.4p5-9.el6_2.ppc64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 58b3522c3d5446be438c1319efb085da
SHA-256: c984e378a393cc7b956ed9298d335392444bc978085e48d40478275576ae75bc
 
s390x:
sudo-1.7.4p5-9.el6_2.s390x.rpm
File outdated by:  RHSA-2013:1701
    MD5: e0413d183b75475c1a9b3daa356c76e2
SHA-256: ad247320f51d23586cfdc39d37e26c76382a49c60ff268251fdb1e9cd0887929
sudo-debuginfo-1.7.4p5-9.el6_2.s390x.rpm
File outdated by:  RHSA-2013:1701
    MD5: 2a5e2e979b1d0e5ab114bd44dbfaf0d3
SHA-256: 6bd9c6abf722da98c144a0a02a6bf5ed3c650cc6a05282381ca8f1b1bbf9bde4
 
x86_64:
sudo-1.7.4p5-9.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: bf05c6bcf07f44b95bef7f9b909017bb
SHA-256: d065f0a1395435e804441631758025a16d5c55e9555d3fa567543617e377f031
sudo-debuginfo-1.7.4p5-9.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 6921f52b37dde593a2e6554f0218f7ab
SHA-256: 46403f5acffcb7ab50ffb5e530b031034acd0771be364c82c4e25386c48c33ac
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
sudo-1.7.4p5-9.el6_2.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: a099e589cca7bbb769f1dbcc684589b8
SHA-256: e24fac970c7f264923ab00d726dbeee681d2b9d6988a41897608393bdf2f0a6f
 
x86_64:
sudo-1.7.4p5-9.el6_2.x86_64.rpm     MD5: bf05c6bcf07f44b95bef7f9b909017bb
SHA-256: d065f0a1395435e804441631758025a16d5c55e9555d3fa567543617e377f031
sudo-debuginfo-1.7.4p5-9.el6_2.x86_64.rpm     MD5: 6921f52b37dde593a2e6554f0218f7ab
SHA-256: 46403f5acffcb7ab50ffb5e530b031034acd0771be364c82c4e25386c48c33ac
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
sudo-1.7.4p5-9.el6_2.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: a099e589cca7bbb769f1dbcc684589b8
SHA-256: e24fac970c7f264923ab00d726dbeee681d2b9d6988a41897608393bdf2f0a6f
 
IA-32:
sudo-1.7.4p5-9.el6_2.i686.rpm     MD5: 52ed597b27715cc04eaab1baf1d7a118
SHA-256: fa4fa7941f416c373b63c27d43fd919402fb29c3413245572becb6d0b647c2ea
sudo-debuginfo-1.7.4p5-9.el6_2.i686.rpm     MD5: 62df1bc597247480ab168d44f895a55e
SHA-256: 9d3101c8b794f37133c026d88816a0abccc345919c3e49d232f97b3ee579b6ba
 
PPC:
sudo-1.7.4p5-9.el6_2.ppc64.rpm     MD5: 49faf4aa2a969179b7a88ec8bd64aeea
SHA-256: ef45cf6de6d4330440984bf5ee2a32954a76de5674d6e869a174d508a47db7bc
sudo-debuginfo-1.7.4p5-9.el6_2.ppc64.rpm     MD5: 58b3522c3d5446be438c1319efb085da
SHA-256: c984e378a393cc7b956ed9298d335392444bc978085e48d40478275576ae75bc
 
s390x:
sudo-1.7.4p5-9.el6_2.s390x.rpm     MD5: e0413d183b75475c1a9b3daa356c76e2
SHA-256: ad247320f51d23586cfdc39d37e26c76382a49c60ff268251fdb1e9cd0887929
sudo-debuginfo-1.7.4p5-9.el6_2.s390x.rpm     MD5: 2a5e2e979b1d0e5ab114bd44dbfaf0d3
SHA-256: 6bd9c6abf722da98c144a0a02a6bf5ed3c650cc6a05282381ca8f1b1bbf9bde4
 
x86_64:
sudo-1.7.4p5-9.el6_2.x86_64.rpm     MD5: bf05c6bcf07f44b95bef7f9b909017bb
SHA-256: d065f0a1395435e804441631758025a16d5c55e9555d3fa567543617e377f031
sudo-debuginfo-1.7.4p5-9.el6_2.x86_64.rpm     MD5: 6921f52b37dde593a2e6554f0218f7ab
SHA-256: 46403f5acffcb7ab50ffb5e530b031034acd0771be364c82c4e25386c48c33ac
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
sudo-1.7.4p5-9.el6_2.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: a099e589cca7bbb769f1dbcc684589b8
SHA-256: e24fac970c7f264923ab00d726dbeee681d2b9d6988a41897608393bdf2f0a6f
 
IA-32:
sudo-1.7.4p5-9.el6_2.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: 52ed597b27715cc04eaab1baf1d7a118
SHA-256: fa4fa7941f416c373b63c27d43fd919402fb29c3413245572becb6d0b647c2ea
sudo-debuginfo-1.7.4p5-9.el6_2.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: 62df1bc597247480ab168d44f895a55e
SHA-256: 9d3101c8b794f37133c026d88816a0abccc345919c3e49d232f97b3ee579b6ba
 
x86_64:
sudo-1.7.4p5-9.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: bf05c6bcf07f44b95bef7f9b909017bb
SHA-256: d065f0a1395435e804441631758025a16d5c55e9555d3fa567543617e377f031
sudo-debuginfo-1.7.4p5-9.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 6921f52b37dde593a2e6554f0218f7ab
SHA-256: 46403f5acffcb7ab50ffb5e530b031034acd0771be364c82c4e25386c48c33ac
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

811879 - "sudo -l -U user" may show incorrect privileges for specified user


Keywords

sudo


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/