Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Patches » RHBA-2013:0616-01

Overview

Id RHBA-2013:0616-01
Name Red Hat 2013:0616-01 RHBA sudo bug fix update for RHEL 5 x86
Vendor Name red_hat
Product None
Content Type Recommended Recommended
Language(s)
Operating System(s) Linux 
Released On 08 Mar 2013 12:00:00

RHBA-2013:0616-01

Red Hat 2013:0616-01 RHBA sudo bug fix update for RHEL 5 x86

Vendor Name

red_hat

Product

None

Released On

08 Mar 2013 12:00:00

Url

https://rhn.redhat.com/errata/RHBA-2013-0616.html

Description

LSAC(v2)
The sudo (superuser do) utility allows system administrators to give certain users the ability to run commands as root. This update fixes the following bugs: * The "sudo -l" command did not parse the /etc/sudoers file correctly if it contained an Active Directory (AD) group. The file was parsed only up to the first AD group information and the command then failed with the following error message: sudo: unable to cache group ADDOM\admingroup, already exists With this update, the underlying code has been modified so the "sudo -l" command now parses the /etc/sudoers file as it is supposed to and no longer displays this error message. (BZ#916220) * Previously, sudo did not escape the backslash characters contained in user names properly. Consequently, if a system used sudo integrated with LDAP or Active Directory as the primary authentication mechanism, users were not able to authenticate on that system. This patch modifies sudo to process LDAP and AD names correctly and the authentication process now functions as expected. (BZ#916232) Users of sudo are advised to upgrade to these updated packages, which fix these bugs.

Related Resources

Related Vulnerabilities

None

Related Patches

None

Superseded Patches


Last Updated: 27 May 2016 11:16:54