Accepting request 33397 from Base:System
Copy from Base:System/sudo based on submit request 33397 from user prusnak OBS-URL: https://build.opensuse.org/request/show/33397 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=24
This commit is contained in:
parent
ad1a4319ea
commit
983ba54b5c
@ -1,6 +1,8 @@
|
|||||||
--- compat.h
|
Index: compat.h
|
||||||
|
===================================================================
|
||||||
|
--- compat.h.orig
|
||||||
+++ compat.h
|
+++ compat.h
|
||||||
@@ -28,6 +28,7 @@
|
@@ -29,6 +29,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* Deal with ANSI stuff reasonably. */
|
/* Deal with ANSI stuff reasonably. */
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
--- defaults.c
|
Index: defaults.c
|
||||||
|
===================================================================
|
||||||
|
--- defaults.c.orig
|
||||||
+++ defaults.c
|
+++ defaults.c
|
||||||
@@ -430,9 +430,6 @@
|
@@ -418,9 +418,6 @@ init_defaults()
|
||||||
#ifdef FQDN
|
#ifdef FQDN
|
||||||
def_fqdn = TRUE;
|
def_fqdn = TRUE;
|
||||||
#endif
|
#endif
|
||||||
|
@ -1,4 +1,6 @@
|
|||||||
--- sudoers2ldif
|
Index: sudoers2ldif
|
||||||
|
===================================================================
|
||||||
|
--- sudoers2ldif.orig
|
||||||
+++ sudoers2ldif
|
+++ sudoers2ldif
|
||||||
@@ -1,4 +1,4 @@
|
@@ -1,4 +1,4 @@
|
||||||
-#!/usr/bin/env perl
|
-#!/usr/bin/env perl
|
||||||
|
@ -1,12 +1,14 @@
|
|||||||
--- auth/pam.c
|
Index: auth/pam.c
|
||||||
|
===================================================================
|
||||||
|
--- auth/pam.c.orig
|
||||||
+++ auth/pam.c
|
+++ auth/pam.c
|
||||||
@@ -209,7 +209,9 @@
|
@@ -111,7 +111,9 @@ pam_init(pw, promptp, auth)
|
||||||
|
* We set PAM_RHOST to avoid a bug in Solaris 7 and below.
|
||||||
*/
|
*/
|
||||||
(void) pam_set_item(pamh, PAM_USER, pw->pw_name);
|
|
||||||
(void) pam_set_item(pamh, PAM_RUSER, user_name);
|
(void) pam_set_item(pamh, PAM_RUSER, user_name);
|
||||||
+#if 0 /* we don't care about Solaris bugs */
|
+#if 0 /* we don't care about Solaris bugs */
|
||||||
(void) pam_set_item(pamh, PAM_RHOST, user_host);
|
(void) pam_set_item(pamh, PAM_RHOST, user_host);
|
||||||
+#endif
|
+#endif
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Set credentials (may include resource limits, device ownership, etc).
|
* Some versions of pam_lastlog have a bug that
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
--- env.c
|
Index: env.c
|
||||||
|
===================================================================
|
||||||
|
--- env.c.orig
|
||||||
+++ env.c
|
+++ env.c
|
||||||
@@ -688,7 +688,7 @@
|
@@ -700,7 +700,7 @@ rebuild_env(sudo_mode, noexec)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
/* Replace the PATH envariable with a secure one? */
|
/* Replace the PATH envariable with a secure one? */
|
||||||
@ -9,9 +11,11 @@
|
|||||||
sudo_setenv("PATH", def_secure_path, TRUE);
|
sudo_setenv("PATH", def_secure_path, TRUE);
|
||||||
SET(didvar, DID_PATH);
|
SET(didvar, DID_PATH);
|
||||||
}
|
}
|
||||||
--- find_path.c
|
Index: find_path.c
|
||||||
|
===================================================================
|
||||||
|
--- find_path.c.orig
|
||||||
+++ find_path.c
|
+++ find_path.c
|
||||||
@@ -87,7 +87,7 @@
|
@@ -87,7 +87,7 @@ find_path(infile, outfile, sbp, path)
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Use PATH passed in unless SECURE_PATH is in effect. */
|
/* Use PATH passed in unless SECURE_PATH is in effect. */
|
||||||
@ -20,9 +24,11 @@
|
|||||||
path = def_secure_path;
|
path = def_secure_path;
|
||||||
else if (path == NULL)
|
else if (path == NULL)
|
||||||
return(NOT_FOUND);
|
return(NOT_FOUND);
|
||||||
--- logging.c
|
Index: logging.c
|
||||||
|
===================================================================
|
||||||
|
--- logging.c.orig
|
||||||
+++ logging.c
|
+++ logging.c
|
||||||
@@ -433,7 +433,7 @@
|
@@ -434,7 +434,7 @@ send_mail(line)
|
||||||
#ifndef NO_ROOT_MAILER
|
#ifndef NO_ROOT_MAILER
|
||||||
static char *root_envp[] = {
|
static char *root_envp[] = {
|
||||||
"HOME=/",
|
"HOME=/",
|
||||||
@ -31,7 +37,9 @@
|
|||||||
"LOGNAME=root",
|
"LOGNAME=root",
|
||||||
"USERNAME=root",
|
"USERNAME=root",
|
||||||
"USER=root",
|
"USER=root",
|
||||||
--- pathnames.h.in
|
Index: pathnames.h.in
|
||||||
|
===================================================================
|
||||||
|
--- pathnames.h.in.orig
|
||||||
+++ pathnames.h.in
|
+++ pathnames.h.in
|
||||||
@@ -41,9 +41,10 @@
|
@@ -41,9 +41,10 @@
|
||||||
#define _PATH_DEVNULL "/dev/null"
|
#define _PATH_DEVNULL "/dev/null"
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
--- Makefile.in
|
Index: Makefile.in
|
||||||
|
===================================================================
|
||||||
|
--- Makefile.in.orig
|
||||||
+++ Makefile.in
|
+++ Makefile.in
|
||||||
@@ -415,11 +415,11 @@
|
@@ -417,11 +417,11 @@ install-dirs:
|
||||||
$(DESTDIR)$(noexecdir)
|
$(DESTDIR)$(noexecdir)
|
||||||
|
|
||||||
install-binaries: install-dirs $(PROGS)
|
install-binaries: install-dirs $(PROGS)
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
--- sudo.man.in
|
Index: sudo.man.in
|
||||||
|
===================================================================
|
||||||
|
--- sudo.man.in.orig
|
||||||
+++ sudo.man.in
|
+++ sudo.man.in
|
||||||
@@ -180,8 +180,8 @@
|
@@ -190,8 +190,8 @@ is initialized based on the group file (
|
||||||
specified). If the invoking user is root or if the target user is
|
specified). If the invoking user is root or if the target user is
|
||||||
the same as the invoking user, no password is required. Otherwise,
|
the same as the invoking user, no password is required. Otherwise,
|
||||||
\&\fBsudo\fR requires that users authenticate themselves with a password
|
\&\fBsudo\fR requires that users authenticate themselves with a password
|
||||||
@ -11,7 +13,9 @@
|
|||||||
a timestamp is updated and the user may then use sudo without a
|
a timestamp is updated and the user may then use sudo without a
|
||||||
password for a short period of time (\f(CW\*(C`@timeout@\*(C'\fR minutes unless
|
password for a short period of time (\f(CW\*(C`@timeout@\*(C'\fR minutes unless
|
||||||
overridden in \fIsudoers\fR).
|
overridden in \fIsudoers\fR).
|
||||||
--- sudoers
|
Index: sudoers
|
||||||
|
===================================================================
|
||||||
|
--- sudoers.orig
|
||||||
+++ sudoers
|
+++ sudoers
|
||||||
@@ -15,6 +15,26 @@
|
@@ -15,6 +15,26 @@
|
||||||
|
|
||||||
|
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:df8e24807b0abd3f407d71aa2b46bdc859a0144bea318c6d1ea21edd476431fe
|
|
||||||
size 582651
|
|
3
sudo-1.7.2p4.tar.gz
Normal file
3
sudo-1.7.2p4.tar.gz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:57d9adbdffa881e32894231079da7d68ffe99f46942818b63baadf6c795b7bdd
|
||||||
|
size 772821
|
25
sudo.changes
25
sudo.changes
@ -1,3 +1,28 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Feb 24 16:19:35 UTC 2010 - prusnak@suse.cz
|
||||||
|
|
||||||
|
- updated to 1.7.2p4
|
||||||
|
* Fixed the expansion of the %h escape in #include file names
|
||||||
|
introduced in sudo 1.7.1.
|
||||||
|
* Fixed a a bug where the negation operator in a Cmnd_List
|
||||||
|
was not being honored.
|
||||||
|
* No longer produce a parse error when #includedir references
|
||||||
|
a directory that contains no valid filenames.
|
||||||
|
* The sudo.man.pl and sudoers.man.pl files are now included
|
||||||
|
in the distribution for people who wish to regenerate the man pages.
|
||||||
|
* Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos.
|
||||||
|
* When authenticating via PAM, set PAM_RUSER and PAM_RHOST early
|
||||||
|
so they can be used during authentication.
|
||||||
|
* Fix printing of entries with multiple host entries on
|
||||||
|
a single line.
|
||||||
|
* Fix use after free when sending error messages via email.
|
||||||
|
* Use setrlimit64(), if available, instead of setrlimit()
|
||||||
|
when setting AIX resource limits since rlim_t is 32bits.
|
||||||
|
* Fix size arg when realloc()ing include stack.
|
||||||
|
* Avoid a duplicate fclose() of the sudoers file.
|
||||||
|
* Fix a bug that could allow users with permission to run sudoedit
|
||||||
|
to run arbitrary commands.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue Jan 26 22:48:31 CET 2010 - jengelh@medozas.de
|
Tue Jan 26 22:48:31 CET 2010 - jengelh@medozas.de
|
||||||
|
|
||||||
|
12
sudo.spec
12
sudo.spec
@ -1,5 +1,5 @@
|
|||||||
#
|
#
|
||||||
# spec file for package sudo (Version 1.7.2)
|
# spec file for package sudo (Version 1.7.2p4)
|
||||||
#
|
#
|
||||||
# Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany.
|
# Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany.
|
||||||
#
|
#
|
||||||
@ -22,13 +22,13 @@ Name: sudo
|
|||||||
BuildRequires: openldap2-devel pam-devel postfix
|
BuildRequires: openldap2-devel pam-devel postfix
|
||||||
BuildRequires: libselinux-devel
|
BuildRequires: libselinux-devel
|
||||||
PreReq: coreutils
|
PreReq: coreutils
|
||||||
Version: 1.7.2
|
Version: 1.7.2p4
|
||||||
Release: 2
|
Release: 1
|
||||||
Group: System/Base
|
Group: System/Base
|
||||||
License: BSD3c(or similar)
|
License: BSD3c(or similar)
|
||||||
Url: http://www.sudo.ws/
|
Url: http://www.sudo.ws/
|
||||||
Summary: Execute some commands as root
|
Summary: Execute some commands as root
|
||||||
Source0: %{name}-%{version}.tar.bz2
|
Source0: http://sudo.ws/sudo/dist/%{name}-%{version}.tar.gz
|
||||||
Source1: %{name}.pamd
|
Source1: %{name}.pamd
|
||||||
Source2: README.SUSE
|
Source2: README.SUSE
|
||||||
Patch1: %{name}-1.7.1-defaults.diff
|
Patch1: %{name}-1.7.1-defaults.diff
|
||||||
@ -96,7 +96,7 @@ make %{?jobs:-j%jobs}
|
|||||||
|
|
||||||
%install
|
%install
|
||||||
make DESTDIR=$RPM_BUILD_ROOT install
|
make DESTDIR=$RPM_BUILD_ROOT install
|
||||||
install -d -m 700 $RPM_BUILD_ROOT/var/run/sudo
|
install -d -m 700 $RPM_BUILD_ROOT%{_localstatedir}/run/sudo
|
||||||
install -d -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/pam.d
|
install -d -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/pam.d
|
||||||
install -m 644 %{SOURCE1} $RPM_BUILD_ROOT%{_sysconfdir}/pam.d/sudo
|
install -m 644 %{SOURCE1} $RPM_BUILD_ROOT%{_sysconfdir}/pam.d/sudo
|
||||||
install -m 755 sudoers2ldif $RPM_BUILD_ROOT%{_sbindir}/sudoers2ldif
|
install -m 755 sudoers2ldif $RPM_BUILD_ROOT%{_sbindir}/sudoers2ldif
|
||||||
@ -119,6 +119,6 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
%{_bindir}/sudoedit
|
%{_bindir}/sudoedit
|
||||||
%{_sbindir}/*
|
%{_sbindir}/*
|
||||||
%{_libexecdir}/sudo
|
%{_libexecdir}/sudo
|
||||||
/var/run/sudo
|
%{_localstatedir}/run/sudo
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
Loading…
x
Reference in New Issue
Block a user