Accepting request 863081 from Base:System
OBS-URL: https://build.opensuse.org/request/show/863081 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=120
This commit is contained in:
commit
5c0ac59b2d
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:c34af1fa79d40d0869e4010bdd64005290ea2e1ba35638ef07fcc684c4470f64
|
|
||||||
size 3994184
|
|
Binary file not shown.
3
sudo-1.9.5p1.tar.gz
Normal file
3
sudo-1.9.5p1.tar.gz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:4dddf37c22653defada299e5681e0daef54bb6f5fc950f63997bb8eb966b7882
|
||||||
|
size 4008926
|
BIN
sudo-1.9.5p1.tar.gz.sig
Normal file
BIN
sudo-1.9.5p1.tar.gz.sig
Normal file
Binary file not shown.
60
sudo.changes
60
sudo.changes
@ -1,3 +1,63 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Jan 14 08:54:04 UTC 2021 - Kristyna Streitova <kstreitova@suse.com>
|
||||||
|
|
||||||
|
- Update to 1.9.5.p1
|
||||||
|
* Fixed a regression introduced in sudo 1.9.5 where the editor run
|
||||||
|
by sudoedit was set-user-ID root unless SELinux RBAC was in use.
|
||||||
|
The editor is now run with the user's real and effective user-IDs.
|
||||||
|
|
||||||
|
- News in 1.9.5
|
||||||
|
* Fixed a crash introduced in 1.9.4 when running "sudo -i" as an
|
||||||
|
unknown user. This is related to but distinct from Bug #948.
|
||||||
|
* If the "lecture_file" setting is enabled in sudoers, it must now
|
||||||
|
refer to a regular file or a symbolic link to a regular file.
|
||||||
|
* Fixed a potential use-after-free bug in sudo_logsrvd when the
|
||||||
|
server shuts down if there are existing connections from clients
|
||||||
|
that are only logging events and not session I/O data.
|
||||||
|
* Fixed a buffer size mismatch when serializing the list of IP
|
||||||
|
addresses for configured network interfaces. This bug is not
|
||||||
|
actually exploitable since the allocated buffer is large enough
|
||||||
|
to hold the list of addresses.
|
||||||
|
* If sudo is executed with a name other than "sudo" or "sudoedit",
|
||||||
|
it will now fall back to "sudo" as the program name. This affects
|
||||||
|
warning, help and usage messages as well as the matching of Debug
|
||||||
|
lines in the /etc/sudo.conf file. Previously, it was possible
|
||||||
|
for the invoking user to manipulate the program name by setting
|
||||||
|
argv[0] to an arbitrary value when executing sudo.
|
||||||
|
* Sudo now checks for failure when setting the close-on-exec flag
|
||||||
|
on open file descriptors. This should never fail but, if it
|
||||||
|
were to, there is the possibility of a file descriptor leak to
|
||||||
|
a child process (such as the command sudo runs).
|
||||||
|
* Fixed CVE-2021-23239, a potential information leak in sudoedit
|
||||||
|
that could be used to test for the existence of directories not
|
||||||
|
normally accessible to the user in certain circumstances. When
|
||||||
|
creating a new file, sudoedit checks to make sure the parent
|
||||||
|
directory of the new file exists before running the editor.
|
||||||
|
However, a race condition exists if the invoking user can replace
|
||||||
|
(or create) the parent directory. If a symbolic link is created
|
||||||
|
in place of the parent directory, sudoedit will run the editor
|
||||||
|
as long as the target of the link exists. If the target of the
|
||||||
|
link does not exist, an error message will be displayed. The
|
||||||
|
race condition can be used to test for the existence of an
|
||||||
|
arbitrary directory. However, it _cannot_ be used to write to
|
||||||
|
an arbitrary location.
|
||||||
|
* Fixed CVE-2021-23240, a flaw in the temporary file handling of
|
||||||
|
sudoedit's SELinux RBAC support. On systems where SELinux is
|
||||||
|
enabled, a user with sudoedit permissions may be able to set the
|
||||||
|
owner of an arbitrary file to the user-ID of the target user.
|
||||||
|
On Linux kernels that support "protected symlinks", setting
|
||||||
|
/proc/sys/fs/protected_symlinks to 1 will prevent the bug from
|
||||||
|
being exploited. For more information see
|
||||||
|
https://www.sudo.ws/alerts/sudoedit_selinux.html.
|
||||||
|
* Added writability checks for sudoedit when SELinux RBAC is in use.
|
||||||
|
This makes sudoedit behavior consistent regardless of whether
|
||||||
|
or not SELinux RBAC is in use. Previously, the "sudoedit_checkdir"
|
||||||
|
setting had no effect for RBAC entries.
|
||||||
|
* A new sudoers option "selinux" can be used to disable sudo's
|
||||||
|
SELinux RBAC support.
|
||||||
|
* Quieted warnings from PVS Studio, clang analyzer, and cppcheck.
|
||||||
|
Added suppression annotations for PVS Studio false positives.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Mon Dec 21 17:13:59 UTC 2020 - Kristyna Streitova <kstreitova@suse.com>
|
Mon Dec 21 17:13:59 UTC 2020 - Kristyna Streitova <kstreitova@suse.com>
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# spec file for package sudo
|
# spec file for package sudo
|
||||||
#
|
#
|
||||||
# Copyright (c) 2020 SUSE LLC
|
# Copyright (c) 2021 SUSE LLC
|
||||||
#
|
#
|
||||||
# All modifications and additions to the file contributed by third parties
|
# All modifications and additions to the file contributed by third parties
|
||||||
# remain the property of their copyright owners, unless otherwise agreed
|
# remain the property of their copyright owners, unless otherwise agreed
|
||||||
@ -22,7 +22,7 @@
|
|||||||
%define use_usretc 1
|
%define use_usretc 1
|
||||||
%endif
|
%endif
|
||||||
Name: sudo
|
Name: sudo
|
||||||
Version: 1.9.4p2
|
Version: 1.9.5p1
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Execute some commands as root
|
Summary: Execute some commands as root
|
||||||
License: ISC
|
License: ISC
|
||||||
|
Loading…
Reference in New Issue
Block a user