Skip to navigation

Bug Fix Advisory sudo bug fix update

Advisory: RHBA-2012:1142-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-08-06
Last updated on: 2012-08-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated sudo packages that fix a bug are now available for Red Hat Enterprise
Linux 6.

The sudo (superuser do) utility allows system administrators to give certain
users the ability to run commands as root.

This update fixes the following bug:

* Due to a regression, the suspend and resume actions of commands in sudo shell
did not work properly. Consequently, the sudo shell could become unresponsive. A
patch has been provided to address this issue and commands in sudo shell can now
be suspended and resumed as expected. (BZ#840872)

Users of sudo are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
sudo-1.7.4p5-13.el6_3.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: 7f124e3a9951a4ec0da0e1edc8b7c3b8
SHA-256: d44429f98515e226e4e1df242d89bea7450376a15576b277f1bdd9709bbb08d6
 
IA-32:
sudo-1.7.4p5-13.el6_3.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: 999213489dacd7a8198063a312f80f36
SHA-256: beed20f170fa9503385f71d6f805ad72944673a8d4604243ae7ce4570ec848ec
sudo-debuginfo-1.7.4p5-13.el6_3.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: becf9f5e3ae7af30c1afb30ade202e1e
SHA-256: 38909b1990e07d10130dd6192aa527526b240d2561f1d0e2c9260dd6cc80edfb
 
x86_64:
sudo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 9ac17486708af40c5d11470cb7bac6cb
SHA-256: 13447f5a1c3d06bfa0526ad6cc25a9ff78943f8f6c45f40fa6e72c486c11038a
sudo-debuginfo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 9baa387a2586f58f86cb0a5169ab0871
SHA-256: 9595260772415e1cfd55926143fc8d441ede1eca2e1dcf32aec585f4dafbab05
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
sudo-1.7.4p5-13.el6_3.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: 7f124e3a9951a4ec0da0e1edc8b7c3b8
SHA-256: d44429f98515e226e4e1df242d89bea7450376a15576b277f1bdd9709bbb08d6
 
x86_64:
sudo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 9ac17486708af40c5d11470cb7bac6cb
SHA-256: 13447f5a1c3d06bfa0526ad6cc25a9ff78943f8f6c45f40fa6e72c486c11038a
sudo-debuginfo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 9baa387a2586f58f86cb0a5169ab0871
SHA-256: 9595260772415e1cfd55926143fc8d441ede1eca2e1dcf32aec585f4dafbab05
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
sudo-1.7.4p5-13.el6_3.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: 7f124e3a9951a4ec0da0e1edc8b7c3b8
SHA-256: d44429f98515e226e4e1df242d89bea7450376a15576b277f1bdd9709bbb08d6
 
IA-32:
sudo-1.7.4p5-13.el6_3.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: 999213489dacd7a8198063a312f80f36
SHA-256: beed20f170fa9503385f71d6f805ad72944673a8d4604243ae7ce4570ec848ec
sudo-debuginfo-1.7.4p5-13.el6_3.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: becf9f5e3ae7af30c1afb30ade202e1e
SHA-256: 38909b1990e07d10130dd6192aa527526b240d2561f1d0e2c9260dd6cc80edfb
 
PPC:
sudo-1.7.4p5-13.el6_3.ppc64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 468119a8b205333ffd6e2d15ee93470e
SHA-256: 2ec21a60d20090878d8e39a8ab6415f5f0ec2d155f7e4ecd2f586bb0b9938620
sudo-debuginfo-1.7.4p5-13.el6_3.ppc64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 5b5957427c59c71e2f19f0661236dc40
SHA-256: 91e8e98c6c9057ef62ebe4c6c6831b85d061999c8c59374589bae1e24ba1d6cd
 
s390x:
sudo-1.7.4p5-13.el6_3.s390x.rpm
File outdated by:  RHSA-2013:1701
    MD5: 8dc4aa82a63e762989cbd90822823b71
SHA-256: 1c6431087f93fcfb5391bf110b4ec9defe0614e8ba280c2843717d1bfd8d2fda
sudo-debuginfo-1.7.4p5-13.el6_3.s390x.rpm
File outdated by:  RHSA-2013:1701
    MD5: ea3907481dde3fd3fbfddfffce3682ff
SHA-256: da648da78c06739a2f761b2ff89b5e3d4b492eeab09d0d2966bf1293a6daf00d
 
x86_64:
sudo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 9ac17486708af40c5d11470cb7bac6cb
SHA-256: 13447f5a1c3d06bfa0526ad6cc25a9ff78943f8f6c45f40fa6e72c486c11038a
sudo-debuginfo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 9baa387a2586f58f86cb0a5169ab0871
SHA-256: 9595260772415e1cfd55926143fc8d441ede1eca2e1dcf32aec585f4dafbab05
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
sudo-1.7.4p5-13.el6_3.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: 7f124e3a9951a4ec0da0e1edc8b7c3b8
SHA-256: d44429f98515e226e4e1df242d89bea7450376a15576b277f1bdd9709bbb08d6
 
IA-32:
sudo-1.7.4p5-13.el6_3.i686.rpm
File outdated by:  RHBA-2013:0619
    MD5: 999213489dacd7a8198063a312f80f36
SHA-256: beed20f170fa9503385f71d6f805ad72944673a8d4604243ae7ce4570ec848ec
sudo-debuginfo-1.7.4p5-13.el6_3.i686.rpm
File outdated by:  RHBA-2013:0619
    MD5: becf9f5e3ae7af30c1afb30ade202e1e
SHA-256: 38909b1990e07d10130dd6192aa527526b240d2561f1d0e2c9260dd6cc80edfb
 
PPC:
sudo-1.7.4p5-13.el6_3.ppc64.rpm
File outdated by:  RHBA-2013:0619
    MD5: 468119a8b205333ffd6e2d15ee93470e
SHA-256: 2ec21a60d20090878d8e39a8ab6415f5f0ec2d155f7e4ecd2f586bb0b9938620
sudo-debuginfo-1.7.4p5-13.el6_3.ppc64.rpm
File outdated by:  RHBA-2013:0619
    MD5: 5b5957427c59c71e2f19f0661236dc40
SHA-256: 91e8e98c6c9057ef62ebe4c6c6831b85d061999c8c59374589bae1e24ba1d6cd
 
s390x:
sudo-1.7.4p5-13.el6_3.s390x.rpm
File outdated by:  RHBA-2013:0619
    MD5: 8dc4aa82a63e762989cbd90822823b71
SHA-256: 1c6431087f93fcfb5391bf110b4ec9defe0614e8ba280c2843717d1bfd8d2fda
sudo-debuginfo-1.7.4p5-13.el6_3.s390x.rpm
File outdated by:  RHBA-2013:0619
    MD5: ea3907481dde3fd3fbfddfffce3682ff
SHA-256: da648da78c06739a2f761b2ff89b5e3d4b492eeab09d0d2966bf1293a6daf00d
 
x86_64:
sudo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:0619
    MD5: 9ac17486708af40c5d11470cb7bac6cb
SHA-256: 13447f5a1c3d06bfa0526ad6cc25a9ff78943f8f6c45f40fa6e72c486c11038a
sudo-debuginfo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:0619
    MD5: 9baa387a2586f58f86cb0a5169ab0871
SHA-256: 9595260772415e1cfd55926143fc8d441ede1eca2e1dcf32aec585f4dafbab05
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
sudo-1.7.4p5-13.el6_3.src.rpm
File outdated by:  RHSA-2013:1701
    MD5: 7f124e3a9951a4ec0da0e1edc8b7c3b8
SHA-256: d44429f98515e226e4e1df242d89bea7450376a15576b277f1bdd9709bbb08d6
 
IA-32:
sudo-1.7.4p5-13.el6_3.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: 999213489dacd7a8198063a312f80f36
SHA-256: beed20f170fa9503385f71d6f805ad72944673a8d4604243ae7ce4570ec848ec
sudo-debuginfo-1.7.4p5-13.el6_3.i686.rpm
File outdated by:  RHSA-2013:1701
    MD5: becf9f5e3ae7af30c1afb30ade202e1e
SHA-256: 38909b1990e07d10130dd6192aa527526b240d2561f1d0e2c9260dd6cc80edfb
 
x86_64:
sudo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 9ac17486708af40c5d11470cb7bac6cb
SHA-256: 13447f5a1c3d06bfa0526ad6cc25a9ff78943f8f6c45f40fa6e72c486c11038a
sudo-debuginfo-1.7.4p5-13.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1701
    MD5: 9baa387a2586f58f86cb0a5169ab0871
SHA-256: 9595260772415e1cfd55926143fc8d441ede1eca2e1dcf32aec585f4dafbab05
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

sudo


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/