Accepting request 33397 from Base:System

Copy from Base:System/sudo based on submit request 33397 from user prusnak

OBS-URL: https://build.opensuse.org/request/show/33397
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=24
This commit is contained in:
OBS User autobuild 2010-02-25 01:34:39 +00:00 committed by Git OBS Bridge
parent ad1a4319ea
commit 983ba54b5c
11 changed files with 77 additions and 30 deletions

View File

@ -1,6 +1,8 @@
--- compat.h Index: compat.h
===================================================================
--- compat.h.orig
+++ compat.h +++ compat.h
@@ -28,6 +28,7 @@ @@ -29,6 +29,7 @@
*/ */
/* Deal with ANSI stuff reasonably. */ /* Deal with ANSI stuff reasonably. */

View File

@ -1,6 +1,8 @@
--- defaults.c Index: defaults.c
===================================================================
--- defaults.c.orig
+++ defaults.c +++ defaults.c
@@ -430,9 +430,6 @@ @@ -418,9 +418,6 @@ init_defaults()
#ifdef FQDN #ifdef FQDN
def_fqdn = TRUE; def_fqdn = TRUE;
#endif #endif

View File

@ -1,4 +1,6 @@
--- sudoers2ldif Index: sudoers2ldif
===================================================================
--- sudoers2ldif.orig
+++ sudoers2ldif +++ sudoers2ldif
@@ -1,4 +1,4 @@ @@ -1,4 +1,4 @@
-#!/usr/bin/env perl -#!/usr/bin/env perl

View File

@ -1,12 +1,14 @@
--- auth/pam.c Index: auth/pam.c
===================================================================
--- auth/pam.c.orig
+++ auth/pam.c +++ auth/pam.c
@@ -209,7 +209,9 @@ @@ -111,7 +111,9 @@ pam_init(pw, promptp, auth)
* We set PAM_RHOST to avoid a bug in Solaris 7 and below.
*/ */
(void) pam_set_item(pamh, PAM_USER, pw->pw_name);
(void) pam_set_item(pamh, PAM_RUSER, user_name); (void) pam_set_item(pamh, PAM_RUSER, user_name);
+#if 0 /* we don't care about Solaris bugs */ +#if 0 /* we don't care about Solaris bugs */
(void) pam_set_item(pamh, PAM_RHOST, user_host); (void) pam_set_item(pamh, PAM_RHOST, user_host);
+#endif +#endif
/* /*
* Set credentials (may include resource limits, device ownership, etc). * Some versions of pam_lastlog have a bug that

View File

@ -1,6 +1,8 @@
--- env.c Index: env.c
===================================================================
--- env.c.orig
+++ env.c +++ env.c
@@ -688,7 +688,7 @@ @@ -700,7 +700,7 @@ rebuild_env(sudo_mode, noexec)
} }
} }
/* Replace the PATH envariable with a secure one? */ /* Replace the PATH envariable with a secure one? */
@ -9,9 +11,11 @@
sudo_setenv("PATH", def_secure_path, TRUE); sudo_setenv("PATH", def_secure_path, TRUE);
SET(didvar, DID_PATH); SET(didvar, DID_PATH);
} }
--- find_path.c Index: find_path.c
===================================================================
--- find_path.c.orig
+++ find_path.c +++ find_path.c
@@ -87,7 +87,7 @@ @@ -87,7 +87,7 @@ find_path(infile, outfile, sbp, path)
} }
/* Use PATH passed in unless SECURE_PATH is in effect. */ /* Use PATH passed in unless SECURE_PATH is in effect. */
@ -20,9 +24,11 @@
path = def_secure_path; path = def_secure_path;
else if (path == NULL) else if (path == NULL)
return(NOT_FOUND); return(NOT_FOUND);
--- logging.c Index: logging.c
===================================================================
--- logging.c.orig
+++ logging.c +++ logging.c
@@ -433,7 +433,7 @@ @@ -434,7 +434,7 @@ send_mail(line)
#ifndef NO_ROOT_MAILER #ifndef NO_ROOT_MAILER
static char *root_envp[] = { static char *root_envp[] = {
"HOME=/", "HOME=/",
@ -31,7 +37,9 @@
"LOGNAME=root", "LOGNAME=root",
"USERNAME=root", "USERNAME=root",
"USER=root", "USER=root",
--- pathnames.h.in Index: pathnames.h.in
===================================================================
--- pathnames.h.in.orig
+++ pathnames.h.in +++ pathnames.h.in
@@ -41,9 +41,10 @@ @@ -41,9 +41,10 @@
#define _PATH_DEVNULL "/dev/null" #define _PATH_DEVNULL "/dev/null"

View File

@ -1,6 +1,8 @@
--- Makefile.in Index: Makefile.in
===================================================================
--- Makefile.in.orig
+++ Makefile.in +++ Makefile.in
@@ -415,11 +415,11 @@ @@ -417,11 +417,11 @@ install-dirs:
$(DESTDIR)$(noexecdir) $(DESTDIR)$(noexecdir)
install-binaries: install-dirs $(PROGS) install-binaries: install-dirs $(PROGS)

View File

@ -1,6 +1,8 @@
--- sudo.man.in Index: sudo.man.in
===================================================================
--- sudo.man.in.orig
+++ sudo.man.in +++ sudo.man.in
@@ -180,8 +180,8 @@ @@ -190,8 +190,8 @@ is initialized based on the group file (
specified). If the invoking user is root or if the target user is specified). If the invoking user is root or if the target user is
the same as the invoking user, no password is required. Otherwise, the same as the invoking user, no password is required. Otherwise,
\&\fBsudo\fR requires that users authenticate themselves with a password \&\fBsudo\fR requires that users authenticate themselves with a password
@ -11,7 +13,9 @@
a timestamp is updated and the user may then use sudo without a a timestamp is updated and the user may then use sudo without a
password for a short period of time (\f(CW\*(C`@timeout@\*(C'\fR minutes unless password for a short period of time (\f(CW\*(C`@timeout@\*(C'\fR minutes unless
overridden in \fIsudoers\fR). overridden in \fIsudoers\fR).
--- sudoers Index: sudoers
===================================================================
--- sudoers.orig
+++ sudoers +++ sudoers
@@ -15,6 +15,26 @@ @@ -15,6 +15,26 @@

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:df8e24807b0abd3f407d71aa2b46bdc859a0144bea318c6d1ea21edd476431fe
size 582651

3
sudo-1.7.2p4.tar.gz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:57d9adbdffa881e32894231079da7d68ffe99f46942818b63baadf6c795b7bdd
size 772821

View File

@ -1,3 +1,28 @@
-------------------------------------------------------------------
Wed Feb 24 16:19:35 UTC 2010 - prusnak@suse.cz
- updated to 1.7.2p4
* Fixed the expansion of the %h escape in #include file names
introduced in sudo 1.7.1.
* Fixed a a bug where the negation operator in a Cmnd_List
was not being honored.
* No longer produce a parse error when #includedir references
a directory that contains no valid filenames.
* The sudo.man.pl and sudoers.man.pl files are now included
in the distribution for people who wish to regenerate the man pages.
* Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos.
* When authenticating via PAM, set PAM_RUSER and PAM_RHOST early
so they can be used during authentication.
* Fix printing of entries with multiple host entries on
a single line.
* Fix use after free when sending error messages via email.
* Use setrlimit64(), if available, instead of setrlimit()
when setting AIX resource limits since rlim_t is 32bits.
* Fix size arg when realloc()ing include stack.
* Avoid a duplicate fclose() of the sudoers file.
* Fix a bug that could allow users with permission to run sudoedit
to run arbitrary commands.
------------------------------------------------------------------- -------------------------------------------------------------------
Tue Jan 26 22:48:31 CET 2010 - jengelh@medozas.de Tue Jan 26 22:48:31 CET 2010 - jengelh@medozas.de

View File

@ -1,5 +1,5 @@
# #
# spec file for package sudo (Version 1.7.2) # spec file for package sudo (Version 1.7.2p4)
# #
# Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany. # Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany.
# #
@ -22,13 +22,13 @@ Name: sudo
BuildRequires: openldap2-devel pam-devel postfix BuildRequires: openldap2-devel pam-devel postfix
BuildRequires: libselinux-devel BuildRequires: libselinux-devel
PreReq: coreutils PreReq: coreutils
Version: 1.7.2 Version: 1.7.2p4
Release: 2 Release: 1
Group: System/Base Group: System/Base
License: BSD3c(or similar) License: BSD3c(or similar)
Url: http://www.sudo.ws/ Url: http://www.sudo.ws/
Summary: Execute some commands as root Summary: Execute some commands as root
Source0: %{name}-%{version}.tar.bz2 Source0: http://sudo.ws/sudo/dist/%{name}-%{version}.tar.gz
Source1: %{name}.pamd Source1: %{name}.pamd
Source2: README.SUSE Source2: README.SUSE
Patch1: %{name}-1.7.1-defaults.diff Patch1: %{name}-1.7.1-defaults.diff
@ -96,7 +96,7 @@ make %{?jobs:-j%jobs}
%install %install
make DESTDIR=$RPM_BUILD_ROOT install make DESTDIR=$RPM_BUILD_ROOT install
install -d -m 700 $RPM_BUILD_ROOT/var/run/sudo install -d -m 700 $RPM_BUILD_ROOT%{_localstatedir}/run/sudo
install -d -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/pam.d install -d -m 755 $RPM_BUILD_ROOT%{_sysconfdir}/pam.d
install -m 644 %{SOURCE1} $RPM_BUILD_ROOT%{_sysconfdir}/pam.d/sudo install -m 644 %{SOURCE1} $RPM_BUILD_ROOT%{_sysconfdir}/pam.d/sudo
install -m 755 sudoers2ldif $RPM_BUILD_ROOT%{_sbindir}/sudoers2ldif install -m 755 sudoers2ldif $RPM_BUILD_ROOT%{_sbindir}/sudoers2ldif
@ -119,6 +119,6 @@ rm -rf $RPM_BUILD_ROOT
%{_bindir}/sudoedit %{_bindir}/sudoedit
%{_sbindir}/* %{_sbindir}/*
%{_libexecdir}/sudo %{_libexecdir}/sudo
/var/run/sudo %{_localstatedir}/run/sudo
%changelog %changelog