Skip to navigation

Bug Fix Advisory sudo bug fix update

Advisory: RHBA-2012:1160-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-08-13
Last updated on: 2012-08-13
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated sudo packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

The sudo (superuser do) utility allows system administrators to give certain
users the ability to run commands as root.

This update fixes the following bug:

* The RHSA-2012:1149 sudo security update introduced a regression that caused
the permissions of the /etc/nsswitch.conf file to change during the installation
or upgrade of the sudo package. This could cause various services to be unable
to access the file. In reported cases, this bug prevented PostgreSQL from
starting. This update fixes the bug and the file's permissions are no longer
changed in the described scenario. (BZ#846974)

All users of sudo are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
sudo-1.7.2p1-14.el5_8.3.src.rpm
File outdated by:  RHSA-2014:0266
    MD5: 4109b2e3bf4bbb975f8120861e4dc9e4
SHA-256: aa4dc00b97801ac157f4ae488270760eef34a58f69cdbbc501c8beb83eddd938
 
IA-32:
sudo-1.7.2p1-14.el5_8.3.i386.rpm
File outdated by:  RHSA-2014:0266
    MD5: f5877ac3d81408210bfb932e976521fd
SHA-256: 5007dc89a1a38de3e55dacd5ad4565de00834628ef3ccfcbe4f5221167117052
sudo-debuginfo-1.7.2p1-14.el5_8.3.i386.rpm
File outdated by:  RHSA-2014:0266
    MD5: f00d72b4e98c06cfab78fabd524181bc
SHA-256: a62b689c6718f3fe0033f0945e4ab605c8be158cdc7e7b81b55f1a82a84a48de
 
IA-64:
sudo-1.7.2p1-14.el5_8.3.ia64.rpm
File outdated by:  RHSA-2014:0266
    MD5: ed2746ea9b45eb8fe9443c1af183dee1
SHA-256: 85f8e6dcebf97efdcda4f03ee243b84efd5ec673a908daeda512d74ee2cf29cd
sudo-debuginfo-1.7.2p1-14.el5_8.3.ia64.rpm
File outdated by:  RHSA-2014:0266
    MD5: 0aaaacd830f9a56d5c454038f94f77ec
SHA-256: d637c75f7217aa91e778ef1e3d035a950879421a22bbea8cabe84a8068f1a241
 
PPC:
sudo-1.7.2p1-14.el5_8.3.ppc.rpm
File outdated by:  RHSA-2014:0266
    MD5: 4caf480b24a70c3c9378edf440cb2b00
SHA-256: 580da905f9f8df15cee540d000c55b12a41ffdc4c3c632f70cbfeef5dbeaac02
sudo-debuginfo-1.7.2p1-14.el5_8.3.ppc.rpm
File outdated by:  RHSA-2014:0266
    MD5: 613b69c954b46bd7553e74a7cce9926a
SHA-256: e7813f0655f39abe48246b3894fd725bd776692e827b780c1f97fd7b91d5ff0d
 
s390x:
sudo-1.7.2p1-14.el5_8.3.s390x.rpm
File outdated by:  RHSA-2014:0266
    MD5: b2d7b86ce3fc189902035c2b808adbed
SHA-256: 7f0b4a02f7a5be64df5cb544dc5770fc1d48294125d317b5a4f6728412bb4f39
sudo-debuginfo-1.7.2p1-14.el5_8.3.s390x.rpm
File outdated by:  RHSA-2014:0266
    MD5: 0d2b8d877a6297d0677abce111c4b09d
SHA-256: c6beb256f352ac35fb0ff949bf958d6d3c63e167b37f63523d8f26555660ef33
 
x86_64:
sudo-1.7.2p1-14.el5_8.3.x86_64.rpm
File outdated by:  RHSA-2014:0266
    MD5: f8a1821c45ea8a93ee1f9640ee989895
SHA-256: c20b49d25932a47adbaf6224f6b5645c1660348491a1d779e25449928891afbd
sudo-debuginfo-1.7.2p1-14.el5_8.3.x86_64.rpm
File outdated by:  RHSA-2014:0266
    MD5: 52bd91dc3173e645e7c91f3ce056a3d8
SHA-256: 00747468a6dc5c352b314f733dbb417b364d4df6e9e9c5d03db6542ca5be90df
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
sudo-1.7.2p1-14.el5_8.3.src.rpm
File outdated by:  RHSA-2014:0266
    MD5: 4109b2e3bf4bbb975f8120861e4dc9e4
SHA-256: aa4dc00b97801ac157f4ae488270760eef34a58f69cdbbc501c8beb83eddd938
 
IA-32:
sudo-1.7.2p1-14.el5_8.3.i386.rpm
File outdated by:  RHSA-2014:0266
    MD5: f5877ac3d81408210bfb932e976521fd
SHA-256: 5007dc89a1a38de3e55dacd5ad4565de00834628ef3ccfcbe4f5221167117052
sudo-debuginfo-1.7.2p1-14.el5_8.3.i386.rpm
File outdated by:  RHSA-2014:0266
    MD5: f00d72b4e98c06cfab78fabd524181bc
SHA-256: a62b689c6718f3fe0033f0945e4ab605c8be158cdc7e7b81b55f1a82a84a48de
 
x86_64:
sudo-1.7.2p1-14.el5_8.3.x86_64.rpm
File outdated by:  RHSA-2014:0266
    MD5: f8a1821c45ea8a93ee1f9640ee989895
SHA-256: c20b49d25932a47adbaf6224f6b5645c1660348491a1d779e25449928891afbd
sudo-debuginfo-1.7.2p1-14.el5_8.3.x86_64.rpm
File outdated by:  RHSA-2014:0266
    MD5: 52bd91dc3173e645e7c91f3ce056a3d8
SHA-256: 00747468a6dc5c352b314f733dbb417b364d4df6e9e9c5d03db6542ca5be90df
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

846974 - Postgresql fail to start on RHEL 5.8



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/