Accepting request 121250 from Base:System

- update to 1.8.5
  Some of the changes:
  * /etc/environment is no longer read directly on Linux systems when
    PAM is used. Sudo now merges the PAM environment into the user's
    environment which is typically set by the pam_env module.
  * The plugin API has been extended
  * The policy plugin's init_session function is now called by the
    parent sudo process, not the child process that executes the command
    This allows the PAM session to be open and closed in the same process,
    which some PAM modules require.
  * A new group provider plugin, system_group, is included
  * Fixed a potential security issue in the matching of hosts against
    an IPv4 network specified in sudoers.The flaw may allow a user who
    is authorized to run commands on hosts belonging to one IPv4
    network to run commands on a different host (CVE-2012-2337) (forwarded request 121223 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/121250
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=47
This commit is contained in:
Stephan Kulow 2012-05-21 06:02:12 +00:00 committed by Git OBS Bridge
commit 7caf0515eb
5 changed files with 23 additions and 33 deletions

View File

@ -1,25 +0,0 @@
Index: sudo-1.8.4p2/src/Makefile.in
===================================================================
--- sudo-1.8.4p2.orig/src/Makefile.in 2012-02-10 18:46:59.000000000 +0100
+++ sudo-1.8.4p2/src/Makefile.in 2012-03-09 15:27:43.370138126 +0100
@@ -100,7 +100,7 @@
$(LIBTOOL) --mode=link $(CC) $(LDFLAGS) $(LTLDFLAGS) -o $@ sudo_noexec.lo -avoid-version -rpath $(noexecdir)
sesh: sesh.o error.o exec_common.o @LIBINTL@ $(LT_LIBS)
- $(LIBTOOL) --mode=link $(CC) -o $@ sesh.o error.o exec_common.o @LIBINTL@ $(LIBS) -static-libtool-libs
+ $(LIBTOOL) --mode=link $(CC) $(CFLAGS) $(LDFLAGS) -o $@ sesh.o error.o exec_common.o @LIBINTL@ $(LIBS) -static-libtool-libs
pre-install:
Index: sudo-1.8.4p2/src/sesh.c
===================================================================
--- sudo-1.8.4p2.orig/src/sesh.c 2012-01-25 20:58:28.000000000 +0100
+++ sudo-1.8.4p2/src/sesh.c 2012-03-09 15:41:52.261671165 +0100
@@ -40,6 +40,7 @@
#include "sudo_debug.h"
#include "sudo_exec.h"
#include "sudo_plugin.h"
+#include "alloc.h"
sudo_conv_t sudo_conv; /* NULL in non-plugin */

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:b1310b8548db5ea92f3063011c0fe6e843a1f95f548a4aeae54bcc2fdfea88a9
size 1608580

3
sudo-1.8.5.tar.gz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:eed695f027c784065d152249ea8753c7a6753f6858b848c8b4ece5b61d5a8150
size 1745494

View File

@ -1,3 +1,22 @@
-------------------------------------------------------------------
Wed May 16 15:27:32 UTC 2012 - vcizek@suse.com
- update to 1.8.5
Some of the changes:
* /etc/environment is no longer read directly on Linux systems when
PAM is used. Sudo now merges the PAM environment into the user's
environment which is typically set by the pam_env module.
* The plugin API has been extended
* The policy plugin's init_session function is now called by the
parent sudo process, not the child process that executes the command
This allows the PAM session to be open and closed in the same process,
which some PAM modules require.
* A new group provider plugin, system_group, is included
* Fixed a potential security issue in the matching of hosts against
an IPv4 network specified in sudoers.The flaw may allow a user who
is authorized to run commands on hosts belonging to one IPv4
network to run commands on a different host (CVE-2012-2337)
-------------------------------------------------------------------
Fri Mar 9 14:19:44 UTC 2012 - vcizek@suse.com

View File

@ -16,9 +16,8 @@
#
Name: sudo
Version: 1.8.4p2
Version: 1.8.5
Release: 0
Summary: Execute some commands as root
License: BSD-3-Clause
@ -29,8 +28,6 @@ Source1: sudo.pamd
Source2: README.SUSE
Patch0: sudoers2ldif-env.patch
Patch1: sudo-sudoers.patch
# PATCH-FIX-OPENSUSE make sesh position-independent (bnc#743157)
Patch2: sudo-1.8.3p1-sesh-cflags.patch
BuildRequires: audit-devel
BuildRequires: libselinux-devel
BuildRequires: openldap2-devel
@ -59,7 +56,6 @@ These header files are needed for building of sudo plugins.
%setup -q
%patch0 -p1
%patch1 -p1
%patch2 -p1
%build
%ifarch s390 s390x %sparc