Execute some commands as root

Edit Package sudo

Sudo is a command that allows users to execute some commands as root.
The /etc/sudoers file (edited with 'visudo') specifies which users have
access to sudo and which commands they can run. Sudo logs all its
activities to syslogd, so the system administrator can keep an eye on
things. Sudo asks for the password for initializing a check period of a
given time N (where N is defined at installation and is set to 5
minutes by default).

Refresh
Refresh
Source Files
Filename Size Changed
50-wheel-auth-self.conf 0000000050 50 Bytes
51-wheel.rules 0000000041 41 Bytes
README.SUSE 0000000400 400 Bytes
README_313276.test 0000000620 620 Bytes
fate_313276_test.sh 0000000258 258 Bytes
sudo-1.9.15p5.tar.gz 0005306611 5.06 MB
sudo-1.9.15p5.tar.gz.sig 0000000566 566 Bytes
sudo-i.pamd 0000000255 255 Bytes
sudo-sudoers.patch 0000004093 4 KB
sudo.changes 0000199492 195 KB
sudo.keyring 0000004683 4.57 KB
sudo.pamd 0000000258 258 Bytes
sudo.spec 0000011201 10.9 KB
system-group-sudo.conf 0000000037 37 Bytes
Latest Revision
Daniel Mach's avatar Daniel Mach (dmach) committed (revision 2)
- Update to 1.9.15p5 (jsc#PED-6562):
  * Fixed evaluation of the lecture, listpw, verifypw, and fdexec sudoers
    Defaults settings when used without an explicit value. Previously, if
    specified without a value they were evaluated as boolean false, even when
    the negation operator ('!') was not present.
  * Fixed a bug introduced in sudo 1.9.14 that prevented LDAP netgroup queries
    using the NETGROUP_BASE setting from being performed.
  * Sudo will now transparently rename a user's lecture file from the older
    name-based path to the newer user-ID-based path. GitHub issue #342.
  * Fixed a bug introduced in sudo 1.9.15 that could cause a memory allocation
    failure if sysconf(_SC_LOGIN_NAME_MAX) fails. Bug #1066.

- For existing products (SLE15-SP* and older) keep using /etc and don't
  switch to /usr/etc. So only SLES16/ALP, Tumbleweed and newer products
  will use both /etc and /usr/etc locations.

- Update to 1.9.15p4:
  * Fixed a bug introduced in sudo 1.9.15 that could prevent a user’s
    privileges from being listed by sudo -l if the sudoers entry
    in /etc/nsswitch.conf contains [SUCCESS=return]. This did not affect the
    ability to run commands via sudo. Bug #1063.
- Update to 1.9.15p3:
  * Always disable core dumps when sudo sends itself a fatal signal. Fixes a
    problem where sudo could potentially dump core dump when it re-sends the
    fatal signal to itself. This is only an issue if the command   * received
    a signal that would normally result in a core dump but the command did
    not actually dump core.
  * Fixed a bug matching a command with a relative path name when the sudoers
    rule uses shell globbing rules for the path name. Bug #1062.
  * Permit visudo to be run even if the local host name is not set. GitHub
Comments 0
openSUSE Build Service is sponsored by