Accepting request 867170 from home:simotek:branches:Base:System
Add some bugzilla references used in SLE and Leap to make some bots happy OBS-URL: https://build.opensuse.org/request/show/867170 OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=194
This commit is contained in:
parent
706ef1b183
commit
f367b20479
@ -1,5 +1,5 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Jan 27 00:25:10 UTC 2021 - Simon Lees <simonf.lees@suse.com>
|
||||
Wed Jan 27 00:25:10 UTC 2021 - Simon Lees <sflees@suse.de>
|
||||
|
||||
- Update to 1.9.5.p2
|
||||
* When invoked as sudoedit, the same set of command line
|
||||
@ -51,7 +51,7 @@ Thu Jan 14 08:54:04 UTC 2021 - Kristyna Streitova <kstreitova@suse.com>
|
||||
warning, help and usage messages as well as the matching of Debug
|
||||
lines in the /etc/sudo.conf file. Previously, it was possible
|
||||
for the invoking user to manipulate the program name by setting
|
||||
argv[0] to an arbitrary value when executing sudo.
|
||||
argv[0] to an arbitrary value when executing sudo. (bsc#1180687)
|
||||
* Sudo now checks for failure when setting the close-on-exec flag
|
||||
on open file descriptors. This should never fail but, if it
|
||||
were to, there is the possibility of a file descriptor leak to
|
||||
@ -68,7 +68,7 @@ Thu Jan 14 08:54:04 UTC 2021 - Kristyna Streitova <kstreitova@suse.com>
|
||||
link does not exist, an error message will be displayed. The
|
||||
race condition can be used to test for the existence of an
|
||||
arbitrary directory. However, it _cannot_ be used to write to
|
||||
an arbitrary location.
|
||||
an arbitrary location. (bsc#1180684)
|
||||
* Fixed CVE-2021-23240, a flaw in the temporary file handling of
|
||||
sudoedit's SELinux RBAC support. On systems where SELinux is
|
||||
enabled, a user with sudoedit permissions may be able to set the
|
||||
@ -76,7 +76,7 @@ Thu Jan 14 08:54:04 UTC 2021 - Kristyna Streitova <kstreitova@suse.com>
|
||||
On Linux kernels that support "protected symlinks", setting
|
||||
/proc/sys/fs/protected_symlinks to 1 will prevent the bug from
|
||||
being exploited. For more information see
|
||||
https://www.sudo.ws/alerts/sudoedit_selinux.html.
|
||||
https://www.sudo.ws/alerts/sudoedit_selinux.html. (bsc#1180685)
|
||||
* Added writability checks for sudoedit when SELinux RBAC is in use.
|
||||
This makes sudoedit behavior consistent regardless of whether
|
||||
or not SELinux RBAC is in use. Previously, the "sudoedit_checkdir"
|
||||
|
Loading…
x
Reference in New Issue
Block a user