Package sudo: Information

Source package: sudo
Version: 1.9.14p1-alt2
Build time:  Jul 18, 2023, 09:10 PM in the task #324836
Category: System/Base
Report package bug
License: ISC
Summary: Allows command execution as another user
Description: 
Sudo is a program designed to allow a sysadmin to give limited root
privileges to users and log root activity.  The basic philosophy is
to give as few privileges as possible but still allow people to get
their work done.

List of rpms provided by this srpm:
sudo (x86_64, ppc64le, i586, armh, aarch64)
sudo-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
sudo-devel (noarch)
sudo-logsrvd (x86_64, ppc64le, i586, armh, aarch64)
sudo-logsrvd-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
sudo-python (x86_64, ppc64le, i586, armh, aarch64)
sudo-python-debuginfo (x86_64, ppc64le, i586, armh, aarch64)

Maintainer: Evgeny Sinelnikov


    1. libpam-devel
    2. python3-dev
    3. libcap-devel
    4. /usr/bin/nroff
    5. libselinux-devel
    6. flex
    7. libaudit-devel
    8. perl-podlators

Last changed


July 14, 2023 Evgeny Sinelnikov 1:1.9.14p1-alt2
- Disable build of shared libutil.
- Enable build with static sudoers.
July 13, 2023 Evgeny Sinelnikov 1:1.9.14p1-alt1
- Sudo now requires a C compiler that conforms to ISO C99 or higher to build.
- Fixed a bug where if the "intercept" or "log_subcmds" sudoers option was
  enabled and a sub-command was run where the first entry of the argument
  vector didn't match the command being run.
- The "intercept_verify" sudoers option is now only applied when the "intercept"
  option is set in sudoers. Previously, it was also applied when "log_subcmds"
  was enabled.
- The sudoers plugin now canonicalizes command path names before matchin.
- Improved command matching when a chroot is specified in sudoers.
- The visudo utility now displays a warning when it ignores a file in an
  include dir such as /etc/sudoers.d.
- When running a command in a pseudo-terminal, sudo will initialize the terminal
  settings even if it is the background process.
- Fixed a bug where only the first two digits of the TSID field being was logged.
- The "log_pty" sudoers option is now enabled by default. To restore the historic
  behavior where a command is run in the user's terminal, add "Defaults !use_pty"
  to the sudoers file.
- Sudo's "-b" option now works when the command is run in a pseudo-terminal.
- When disabling core dumps, sudo now only modifies the soft limit and leaves
  the hard limit as-is. This avoids problems on Linux when sudo does not have
  CAP_SYS_RESOURCE, which may be the case when run inside a container.
- Sudo configuration file paths have been converted to colon-separated lists of
  paths. This makes it possible to have configuration files on a read-only file
  system while still allowing for local modifications in a different (writable)
  directory.
- Fixed a long-standing bug where a sudoers rule without an explicit runas list
  allowed the user to run a command as root and any group instead of just one of
  the groups that root is a member of.
- Fixed a bug where a sudoers rule with an explicit runas list allowed a user to
  run sudo commands as themselves.
- Fixed a bug that prevented the user from specifying a group on the command line
  via "sudo -g" if the rule's Runas_Spec contained a Runas_Alias.
- Fixed regressions in sudo 1.9.13:
 + Fixed a bug that resulted in a missing " ; " separator between environment
   variables and the command in log entries.
April 17, 2023 Evgeny Sinelnikov 1:1.9.13p3-alt1
- Update to latest stable release with regressions.
- Fixed a bug that could cause sudo to hang when running a command
  in a pseudo-terminal when there is still input buffered after a
  command has exited.
- Fixed regressions in sudo 1.9.13:
 + Fixed a bug introduced in sudo 1.9.13 that caused a syntax error
   when "list" was used as a user or host name (GitHub #246).
 + Fixed "sudo -U otheruser -l command" (GitHub #248).
 + Fixed "sudo -l command args" when matching a command in sudoers
   with command line arguments (GitHub #249).