An update for sudo is now available for Red Hat Enterprise Linux 6 and Red HatEnterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofModerate.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The sudo packages contain the sudo utility which allows system administrators toprovide certain users with the permission to execute privileged commands, whichare used for system management purposes, without having to log in as root.Security Fix(es):* It was discovered that the sudo noexec restriction could have been bypassed ifapplication run via sudo executed system(), popen(), or wordexp() C libraryfunctions with a user supplied argument.

A local user permitted to run suchapplication via sudo with noexec restriction could use these flaws to executearbitrary commands with elevated privileges. (CVE-2016-7032, CVE-2016-7076)These issues were discovered by Florian Weimer (Red Hat).
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
sudo-1.8.6p3-25.el6_8.src.rpm
    MD5: a85d189732a00577cde46792636bce14SHA-256: 9361e2ecd77601995e5c805d5842887dd651eea57f178ba25f1abe9088347894
 
IA-32:
sudo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 3edd78c5a0c41c16a0524603d57b29ddSHA-256: a205eb5aea2c336fca566cdc471a6887f0c6adcbc6988aa12578d10913c03961
sudo-debuginfo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 8d69c8d4d5cf3d9353a7f7c26fc7beb3SHA-256: ce56db4bf000b5a45d1f727dddb6c57b8d2188a9580a62f73c619f8a2195c33e
sudo-devel-1.8.6p3-25.el6_8.i686.rpm
    MD5: abe110732ac27470d4792ecdef25d386SHA-256: a7a041900e417a468ff5907131ddeb80f642808b92f815261bd241508e50a68b
 
x86_64:
sudo-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: d04633d51140b653b4123f1058f0431bSHA-256: e86448bb5242fe16cb9f9c0dba3662480fa695dba33a6c9066bf463cd846336f
sudo-debuginfo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 8d69c8d4d5cf3d9353a7f7c26fc7beb3SHA-256: ce56db4bf000b5a45d1f727dddb6c57b8d2188a9580a62f73c619f8a2195c33e
sudo-debuginfo-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: f5c535734bf16e7bf1fc4104bf49c175SHA-256: 13cfca65577bad47431c62e828cbe4f5b6fa35944c74f23e504cb76d2514fa8d
sudo-devel-1.8.6p3-25.el6_8.i686.rpm
    MD5: abe110732ac27470d4792ecdef25d386SHA-256: a7a041900e417a468ff5907131ddeb80f642808b92f815261bd241508e50a68b
sudo-devel-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: 86aa3f9faae7feba7a0c10dcc9a297a9SHA-256: ce71ca8267d6d1dda5b9dacef726b87b999718cd1c72cb3988e3371a41c6f94d
 
Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
sudo-1.8.6p7-21.el7_3.src.rpm
    MD5: 98b8f8c509d0a97d5314fbf0b0d09eceSHA-256: 9d70386cadce45546d97555dff61f7c4b6f155fbda016188044c7d7cf100cd49
 
x86_64:
sudo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 034de2034dab7204a5849bfd83bc326cSHA-256: 52959810b9cda599161e034cfcf556d9c6b0347c156187394f2f9950fe2f295b
sudo-debuginfo-1.8.6p7-21.el7_3.i686.rpm
    MD5: 91e20fd6ac66a5a1a752b69690b5ce3aSHA-256: 072dd0e694c877b581a1bae2e6703928bf49bb8e68093d49643702357e2ce273
sudo-debuginfo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 300c0e81231256a5a32cc39cbaa46506SHA-256: a66da4fbcbf414662b29188609c9996e6e532549d32ec7d20d130deb18246fbc
sudo-devel-1.8.6p7-21.el7_3.i686.rpm
    MD5: 5894fc3f36e6c860e5a55cd652107492SHA-256: 1e8eae3f73fa4847476a06a0b9c248182d4daeba2598f350c4352ccf4768efe7
sudo-devel-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: bcbf1fd726d892c513b4472c75c3b08eSHA-256: e9137a3f971bb3508ed9cd9ae85e2430c06f912d8659e30b2fef39e2e88159d4
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
sudo-1.8.6p3-25.el6_8.src.rpm
    MD5: a85d189732a00577cde46792636bce14SHA-256: 9361e2ecd77601995e5c805d5842887dd651eea57f178ba25f1abe9088347894
 
x86_64:
sudo-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: d04633d51140b653b4123f1058f0431bSHA-256: e86448bb5242fe16cb9f9c0dba3662480fa695dba33a6c9066bf463cd846336f
sudo-debuginfo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 8d69c8d4d5cf3d9353a7f7c26fc7beb3SHA-256: ce56db4bf000b5a45d1f727dddb6c57b8d2188a9580a62f73c619f8a2195c33e
sudo-debuginfo-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: f5c535734bf16e7bf1fc4104bf49c175SHA-256: 13cfca65577bad47431c62e828cbe4f5b6fa35944c74f23e504cb76d2514fa8d
sudo-devel-1.8.6p3-25.el6_8.i686.rpm
    MD5: abe110732ac27470d4792ecdef25d386SHA-256: a7a041900e417a468ff5907131ddeb80f642808b92f815261bd241508e50a68b
sudo-devel-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: 86aa3f9faae7feba7a0c10dcc9a297a9SHA-256: ce71ca8267d6d1dda5b9dacef726b87b999718cd1c72cb3988e3371a41c6f94d
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
sudo-1.8.6p7-21.el7_3.src.rpm
    MD5: 98b8f8c509d0a97d5314fbf0b0d09eceSHA-256: 9d70386cadce45546d97555dff61f7c4b6f155fbda016188044c7d7cf100cd49
 
x86_64:
sudo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 034de2034dab7204a5849bfd83bc326cSHA-256: 52959810b9cda599161e034cfcf556d9c6b0347c156187394f2f9950fe2f295b
sudo-debuginfo-1.8.6p7-21.el7_3.i686.rpm
    MD5: 91e20fd6ac66a5a1a752b69690b5ce3aSHA-256: 072dd0e694c877b581a1bae2e6703928bf49bb8e68093d49643702357e2ce273
sudo-debuginfo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 300c0e81231256a5a32cc39cbaa46506SHA-256: a66da4fbcbf414662b29188609c9996e6e532549d32ec7d20d130deb18246fbc
sudo-devel-1.8.6p7-21.el7_3.i686.rpm
    MD5: 5894fc3f36e6c860e5a55cd652107492SHA-256: 1e8eae3f73fa4847476a06a0b9c248182d4daeba2598f350c4352ccf4768efe7
sudo-devel-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: bcbf1fd726d892c513b4472c75c3b08eSHA-256: e9137a3f971bb3508ed9cd9ae85e2430c06f912d8659e30b2fef39e2e88159d4
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
sudo-1.8.6p3-25.el6_8.src.rpm
    MD5: a85d189732a00577cde46792636bce14SHA-256: 9361e2ecd77601995e5c805d5842887dd651eea57f178ba25f1abe9088347894
 
IA-32:
sudo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 3edd78c5a0c41c16a0524603d57b29ddSHA-256: a205eb5aea2c336fca566cdc471a6887f0c6adcbc6988aa12578d10913c03961
sudo-debuginfo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 8d69c8d4d5cf3d9353a7f7c26fc7beb3SHA-256: ce56db4bf000b5a45d1f727dddb6c57b8d2188a9580a62f73c619f8a2195c33e
sudo-devel-1.8.6p3-25.el6_8.i686.rpm
    MD5: abe110732ac27470d4792ecdef25d386SHA-256: a7a041900e417a468ff5907131ddeb80f642808b92f815261bd241508e50a68b
 
PPC:
sudo-1.8.6p3-25.el6_8.ppc64.rpm
    MD5: ffd9fec99e3608ba5b1857d9832dcb67SHA-256: 7f31298f1cd5f865c1dd993a64ef170f375e14f0d433a93fcb40d68923c56ddc
sudo-debuginfo-1.8.6p3-25.el6_8.ppc.rpm
    MD5: b8093571882eda51ba600d8d347b5feeSHA-256: 970bb4030fab61803e5a2bd6d06dc7f228e9668f6136a3ed73d9ada4f5e73dbc
sudo-debuginfo-1.8.6p3-25.el6_8.ppc64.rpm
    MD5: 9b1cd7bfb28fcbd5f752b5eb659e99f6SHA-256: 7d8563060c2a0f1b2cac7e32033a94ad1f089d022b70eb943042eff619ffd884
sudo-devel-1.8.6p3-25.el6_8.ppc.rpm
    MD5: 923479bcd416d5cc4ba081dca1f6fbbeSHA-256: 6eac91cf4113f619c9c03b0106d9fe1de44b993b32db7e977f84db89c7054b05
sudo-devel-1.8.6p3-25.el6_8.ppc64.rpm
    MD5: f6bc3c115149dbc7973a94e7d0fb2729SHA-256: eed94439b7123d01a6589a2a133bcd04fcf397ac2c2db11ea544afbb1dea3681
 
s390x:
sudo-1.8.6p3-25.el6_8.s390x.rpm
    MD5: 6d2d2d9e9c90b2f47f02082b96a349deSHA-256: f609ffc541581a2898e9a8017b773eb6f3143b9ac342d17858ced4b80da1c3e8
sudo-debuginfo-1.8.6p3-25.el6_8.s390.rpm
    MD5: d8a32a743de5fc5c0f0536a29be39360SHA-256: 7d3b78738aca0c1d61c4144d1c671da918e3238bb9a072a6c727eea1d5fa1285
sudo-debuginfo-1.8.6p3-25.el6_8.s390x.rpm
    MD5: 03f735b9fa40d45bcbd4ea4a2ff09a39SHA-256: 2c2232741d65367b5b7abc10812060a90d55340bdf816f43feaeaf594f2752ac
sudo-devel-1.8.6p3-25.el6_8.s390.rpm
    MD5: 7f66277cab8de9b796859199bcf40033SHA-256: 6836784ee09c067937d8df77ee632e82d048eed511b9fa8a6a739e0a7a62eca6
sudo-devel-1.8.6p3-25.el6_8.s390x.rpm
    MD5: 1a4b6e2fca4e02d650fa647a9ff0d925SHA-256: 5e7722cf30437e372273c0cef58e742acc1e4fd1be37e9de53b46459ce7e3d39
 
x86_64:
sudo-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: d04633d51140b653b4123f1058f0431bSHA-256: e86448bb5242fe16cb9f9c0dba3662480fa695dba33a6c9066bf463cd846336f
sudo-debuginfo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 8d69c8d4d5cf3d9353a7f7c26fc7beb3SHA-256: ce56db4bf000b5a45d1f727dddb6c57b8d2188a9580a62f73c619f8a2195c33e
sudo-debuginfo-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: f5c535734bf16e7bf1fc4104bf49c175SHA-256: 13cfca65577bad47431c62e828cbe4f5b6fa35944c74f23e504cb76d2514fa8d
sudo-devel-1.8.6p3-25.el6_8.i686.rpm
    MD5: abe110732ac27470d4792ecdef25d386SHA-256: a7a041900e417a468ff5907131ddeb80f642808b92f815261bd241508e50a68b
sudo-devel-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: 86aa3f9faae7feba7a0c10dcc9a297a9SHA-256: ce71ca8267d6d1dda5b9dacef726b87b999718cd1c72cb3988e3371a41c6f94d
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
sudo-1.8.6p7-21.el7_3.src.rpm
    MD5: 98b8f8c509d0a97d5314fbf0b0d09eceSHA-256: 9d70386cadce45546d97555dff61f7c4b6f155fbda016188044c7d7cf100cd49
 
PPC:
sudo-1.8.6p7-21.el7_3.ppc64.rpm
    MD5: d55cde0fbc4f2137ed29b8f6f62ae806SHA-256: bc4e8255fe84b5d197b48640199915899043f521e9a4369f820efbc85e6b8d31
sudo-debuginfo-1.8.6p7-21.el7_3.ppc.rpm
    MD5: 4dd61dff509942de1f5cc115f051f758SHA-256: bef9d1050b97a015c54a4afbf1ff0006104c2e9fcbaca3dae0e4a70b8b1a2634
sudo-debuginfo-1.8.6p7-21.el7_3.ppc64.rpm
    MD5: 31e7b0aa727bce390d0fd74031894976SHA-256: 4e4fed168285207c070e160fca8069fc62ad6be0bb20daff6711601a37924c61
sudo-devel-1.8.6p7-21.el7_3.ppc.rpm
    MD5: e732902c289870fb12909bd4fb49f66aSHA-256: 8799a375f0adad7d04fc9baa7ab75fe7cabbd9be304eda3e88ed64e79722fd68
sudo-devel-1.8.6p7-21.el7_3.ppc64.rpm
    MD5: 1506295d7c08d676078db4659bbd489cSHA-256: b6d527e1385d1a5020c2beef4cd57f11d2d8c45233759e38b65b2ebdde68b4c3
 
PPC64LE:
sudo-1.8.6p7-21.el7_3.ppc64le.rpm
    MD5: d95144c9a58b707ca271cdebd5c7af6aSHA-256: a06e8598380ea4f5ea358e5f29ab177d6ae4536fe8cd76a5938f12853e77e21c
sudo-debuginfo-1.8.6p7-21.el7_3.ppc64le.rpm
    MD5: 35cb14fee6b6a4281bc35bfe4a6fbc79SHA-256: e4be25936572ded7746959a3b6b56ff5c964d8e7d3687ee854c67079b110f6b9
sudo-devel-1.8.6p7-21.el7_3.ppc64le.rpm
    MD5: 9bc00225985be24c05ca1bcae3343664SHA-256: af914e1154f0eb8de407c5d1795a10d184f0fbe7af92f6e4c6046c2ff3ec6159
 
s390x:
sudo-1.8.6p7-21.el7_3.s390x.rpm
    MD5: 140a660f696e7ec5dab4b94cefc1f003SHA-256: 43c601398a8ed01d498e3d5217ea3c7395ea163820bbe10e3f263ec69024bb03
sudo-debuginfo-1.8.6p7-21.el7_3.s390.rpm
    MD5: 1f39b3888e565354ccd77152d21621dfSHA-256: e398da919e73e92904a06b25d573f91f0599757974239337225d652d736617e4
sudo-debuginfo-1.8.6p7-21.el7_3.s390x.rpm
    MD5: d89cb44bfc525ee9a050bb9c23605b49SHA-256: b6aca918c14e8856e508c1e792fd9e92ffb279895e7b77c52a03d80446f07f89
sudo-devel-1.8.6p7-21.el7_3.s390.rpm
    MD5: b46a7217979e166b81467df28c7d46c4SHA-256: 45be4078a3387bd51f53b6cd62e30839fffe10472be4e143cb20fa8401f8c8bb
sudo-devel-1.8.6p7-21.el7_3.s390x.rpm
    MD5: cb13f449bd71633320ae38e3112bfd64SHA-256: 99b3daf8c22765420dc01d704d450fca71f9c6f05dcdfc0fe71ca5fbc3f759cf
 
x86_64:
sudo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 034de2034dab7204a5849bfd83bc326cSHA-256: 52959810b9cda599161e034cfcf556d9c6b0347c156187394f2f9950fe2f295b
sudo-debuginfo-1.8.6p7-21.el7_3.i686.rpm
    MD5: 91e20fd6ac66a5a1a752b69690b5ce3aSHA-256: 072dd0e694c877b581a1bae2e6703928bf49bb8e68093d49643702357e2ce273
sudo-debuginfo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 300c0e81231256a5a32cc39cbaa46506SHA-256: a66da4fbcbf414662b29188609c9996e6e532549d32ec7d20d130deb18246fbc
sudo-devel-1.8.6p7-21.el7_3.i686.rpm
    MD5: 5894fc3f36e6c860e5a55cd652107492SHA-256: 1e8eae3f73fa4847476a06a0b9c248182d4daeba2598f350c4352ccf4768efe7
sudo-devel-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: bcbf1fd726d892c513b4472c75c3b08eSHA-256: e9137a3f971bb3508ed9cd9ae85e2430c06f912d8659e30b2fef39e2e88159d4
 
Red Hat Enterprise Linux Server TUS (v. 7.3)

SRPMS:
sudo-1.8.6p7-21.el7_3.src.rpm
    MD5: 98b8f8c509d0a97d5314fbf0b0d09eceSHA-256: 9d70386cadce45546d97555dff61f7c4b6f155fbda016188044c7d7cf100cd49
 
x86_64:
sudo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 034de2034dab7204a5849bfd83bc326cSHA-256: 52959810b9cda599161e034cfcf556d9c6b0347c156187394f2f9950fe2f295b
sudo-debuginfo-1.8.6p7-21.el7_3.i686.rpm
    MD5: 91e20fd6ac66a5a1a752b69690b5ce3aSHA-256: 072dd0e694c877b581a1bae2e6703928bf49bb8e68093d49643702357e2ce273
sudo-debuginfo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 300c0e81231256a5a32cc39cbaa46506SHA-256: a66da4fbcbf414662b29188609c9996e6e532549d32ec7d20d130deb18246fbc
sudo-devel-1.8.6p7-21.el7_3.i686.rpm
    MD5: 5894fc3f36e6c860e5a55cd652107492SHA-256: 1e8eae3f73fa4847476a06a0b9c248182d4daeba2598f350c4352ccf4768efe7
sudo-devel-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: bcbf1fd726d892c513b4472c75c3b08eSHA-256: e9137a3f971bb3508ed9cd9ae85e2430c06f912d8659e30b2fef39e2e88159d4
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
sudo-1.8.6p3-25.el6_8.src.rpm
    MD5: a85d189732a00577cde46792636bce14SHA-256: 9361e2ecd77601995e5c805d5842887dd651eea57f178ba25f1abe9088347894
 
IA-32:
sudo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 3edd78c5a0c41c16a0524603d57b29ddSHA-256: a205eb5aea2c336fca566cdc471a6887f0c6adcbc6988aa12578d10913c03961
sudo-debuginfo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 8d69c8d4d5cf3d9353a7f7c26fc7beb3SHA-256: ce56db4bf000b5a45d1f727dddb6c57b8d2188a9580a62f73c619f8a2195c33e
sudo-devel-1.8.6p3-25.el6_8.i686.rpm
    MD5: abe110732ac27470d4792ecdef25d386SHA-256: a7a041900e417a468ff5907131ddeb80f642808b92f815261bd241508e50a68b
 
x86_64:
sudo-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: d04633d51140b653b4123f1058f0431bSHA-256: e86448bb5242fe16cb9f9c0dba3662480fa695dba33a6c9066bf463cd846336f
sudo-debuginfo-1.8.6p3-25.el6_8.i686.rpm
    MD5: 8d69c8d4d5cf3d9353a7f7c26fc7beb3SHA-256: ce56db4bf000b5a45d1f727dddb6c57b8d2188a9580a62f73c619f8a2195c33e
sudo-debuginfo-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: f5c535734bf16e7bf1fc4104bf49c175SHA-256: 13cfca65577bad47431c62e828cbe4f5b6fa35944c74f23e504cb76d2514fa8d
sudo-devel-1.8.6p3-25.el6_8.i686.rpm
    MD5: abe110732ac27470d4792ecdef25d386SHA-256: a7a041900e417a468ff5907131ddeb80f642808b92f815261bd241508e50a68b
sudo-devel-1.8.6p3-25.el6_8.x86_64.rpm
    MD5: 86aa3f9faae7feba7a0c10dcc9a297a9SHA-256: ce71ca8267d6d1dda5b9dacef726b87b999718cd1c72cb3988e3371a41c6f94d
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
sudo-1.8.6p7-21.el7_3.src.rpm
    MD5: 98b8f8c509d0a97d5314fbf0b0d09eceSHA-256: 9d70386cadce45546d97555dff61f7c4b6f155fbda016188044c7d7cf100cd49
 
x86_64:
sudo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 034de2034dab7204a5849bfd83bc326cSHA-256: 52959810b9cda599161e034cfcf556d9c6b0347c156187394f2f9950fe2f295b
sudo-debuginfo-1.8.6p7-21.el7_3.i686.rpm
    MD5: 91e20fd6ac66a5a1a752b69690b5ce3aSHA-256: 072dd0e694c877b581a1bae2e6703928bf49bb8e68093d49643702357e2ce273
sudo-debuginfo-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: 300c0e81231256a5a32cc39cbaa46506SHA-256: a66da4fbcbf414662b29188609c9996e6e532549d32ec7d20d130deb18246fbc
sudo-devel-1.8.6p7-21.el7_3.i686.rpm
    MD5: 5894fc3f36e6c860e5a55cd652107492SHA-256: 1e8eae3f73fa4847476a06a0b9c248182d4daeba2598f350c4352ccf4768efe7
sudo-devel-1.8.6p7-21.el7_3.x86_64.rpm
    MD5: bcbf1fd726d892c513b4472c75c3b08eSHA-256: e9137a3f971bb3508ed9cd9ae85e2430c06f912d8659e30b2fef39e2e88159d4
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply