| Summary: | [UPDATE REQUEST] [UPSTREAM UPDATE] sudo | ||
|---|---|---|---|
| Product: | Server Bugs | Reporter: | Andrew Lukoshko <andrew.lukoshko> |
| Component: | Main Packages | Assignee: | Andrew Lukoshko <andrew.lukoshko> |
| Status: | RESOLVED FIXED | QA Contact: | ROSA Server Bugs <server-bugs> |
| Severity: | normal | ||
| Priority: | Normal | CC: | alexander.petryakov, dmitry.romashkin |
| Version: | unspecified | Flags: | alexander.petryakov:
qa_verified+
dmitry.romashkin: secteam_verified+ andrew.lukoshko: published_server+ |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Platform: | --- | ROSA Vulnerability identifier: | |
| RPM Package: | ISO-related: | ||
| Bad POT generating: | Upstream: | ||
|
Description
Andrew Lukoshko
2013-03-22 15:25:40 MSK
sudo-1.7.4p5-13.res6.1 **************** RHEL Advisory **************** * Previously, the sudo utility executed commands directly and replaced the sudo process. However, in a previous update, internal execution method of commands in sudo changed and sudo now runs commands as child processes. This change in behavior caused problems with custom scripts. This update adds the cmnd_no_wait option; with it, the old behavior is restored and commands are executed directly in the sudo process, thus fixing this bug. https://rhn.redhat.com/errata/RHBA-2013-0619.html *********************************************** QA Verified |