diff --git a/sudo-1.8.3p1-sesh-cflags.patch b/sudo-1.8.3p1-sesh-cflags.patch deleted file mode 100644 index a97c50f..0000000 --- a/sudo-1.8.3p1-sesh-cflags.patch +++ /dev/null @@ -1,25 +0,0 @@ -Index: sudo-1.8.4p2/src/Makefile.in -=================================================================== ---- sudo-1.8.4p2.orig/src/Makefile.in 2012-02-10 18:46:59.000000000 +0100 -+++ sudo-1.8.4p2/src/Makefile.in 2012-03-09 15:27:43.370138126 +0100 -@@ -100,7 +100,7 @@ - $(LIBTOOL) --mode=link $(CC) $(LDFLAGS) $(LTLDFLAGS) -o $@ sudo_noexec.lo -avoid-version -rpath $(noexecdir) - - sesh: sesh.o error.o exec_common.o @LIBINTL@ $(LT_LIBS) -- $(LIBTOOL) --mode=link $(CC) -o $@ sesh.o error.o exec_common.o @LIBINTL@ $(LIBS) -static-libtool-libs -+ $(LIBTOOL) --mode=link $(CC) $(CFLAGS) $(LDFLAGS) -o $@ sesh.o error.o exec_common.o @LIBINTL@ $(LIBS) -static-libtool-libs - - pre-install: - -Index: sudo-1.8.4p2/src/sesh.c -=================================================================== ---- sudo-1.8.4p2.orig/src/sesh.c 2012-01-25 20:58:28.000000000 +0100 -+++ sudo-1.8.4p2/src/sesh.c 2012-03-09 15:41:52.261671165 +0100 -@@ -40,6 +40,7 @@ - #include "sudo_debug.h" - #include "sudo_exec.h" - #include "sudo_plugin.h" -+#include "alloc.h" - - sudo_conv_t sudo_conv; /* NULL in non-plugin */ - diff --git a/sudo-1.8.4p2.tar.gz b/sudo-1.8.4p2.tar.gz deleted file mode 100644 index 964f3ed..0000000 --- a/sudo-1.8.4p2.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:b1310b8548db5ea92f3063011c0fe6e843a1f95f548a4aeae54bcc2fdfea88a9 -size 1608580 diff --git a/sudo-1.8.5.tar.gz b/sudo-1.8.5.tar.gz new file mode 100644 index 0000000..a4ea093 --- /dev/null +++ b/sudo-1.8.5.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:eed695f027c784065d152249ea8753c7a6753f6858b848c8b4ece5b61d5a8150 +size 1745494 diff --git a/sudo.changes b/sudo.changes index 73048a9..c660f80 100644 --- a/sudo.changes +++ b/sudo.changes @@ -1,3 +1,22 @@ +------------------------------------------------------------------- +Wed May 16 15:27:32 UTC 2012 - vcizek@suse.com + +- update to 1.8.5 + Some of the changes: + * /etc/environment is no longer read directly on Linux systems when + PAM is used. Sudo now merges the PAM environment into the user's + environment which is typically set by the pam_env module. + * The plugin API has been extended + * The policy plugin's init_session function is now called by the + parent sudo process, not the child process that executes the command + This allows the PAM session to be open and closed in the same process, + which some PAM modules require. + * A new group provider plugin, system_group, is included + * Fixed a potential security issue in the matching of hosts against + an IPv4 network specified in sudoers.The flaw may allow a user who + is authorized to run commands on hosts belonging to one IPv4 + network to run commands on a different host (CVE-2012-2337) + ------------------------------------------------------------------- Fri Mar 9 14:19:44 UTC 2012 - vcizek@suse.com diff --git a/sudo.spec b/sudo.spec index 044dfba..a879f98 100644 --- a/sudo.spec +++ b/sudo.spec @@ -16,9 +16,8 @@ # - Name: sudo -Version: 1.8.4p2 +Version: 1.8.5 Release: 0 Summary: Execute some commands as root License: BSD-3-Clause @@ -29,8 +28,6 @@ Source1: sudo.pamd Source2: README.SUSE Patch0: sudoers2ldif-env.patch Patch1: sudo-sudoers.patch -# PATCH-FIX-OPENSUSE make sesh position-independent (bnc#743157) -Patch2: sudo-1.8.3p1-sesh-cflags.patch BuildRequires: audit-devel BuildRequires: libselinux-devel BuildRequires: openldap2-devel @@ -59,7 +56,6 @@ These header files are needed for building of sudo plugins. %setup -q %patch0 -p1 %patch1 -p1 -%patch2 -p1 %build %ifarch s390 s390x %sparc