Accepting request 568794 from home:avindra
- Update to 1.8.22 * Commands run in the background from a script run via sudo will no longer receive SIGHUP when the parent exits and I/O logging is enabled * A particularly offensive insult is now disabled by default * The description of sudo -i now correctly documents that the env_keep and env_check sudoers options are applied to the environment * Fixed a crash when the system's host name is not set * The sudoers2ldif script now handles #include and #includedir directives. * Fixed a bug where sudo would silently exit when the command was not allowed by sudoers and the passwd_tries sudoers option was set to a value less than one. * Fixed a bug with the listpw and verifypw sudoers options and multiple sudoers sources. If the option is set to all a password should be required unless none of a user's sudoers entries from any source require authentication. * Fixed a bug with the listpw and verifypw sudoers options in the LDAP and SSSD back-ends. If the option is set to any and the entry contained multiple rules, only the first matching rule was checked. If an entry contained more than one matching rule and the first rule required authentication but a subsequent rule did not, sudo would prompt for a password when it should not have. * When running a command as the invoking user (not root), sudo would execute the command with the same group vector it was started with. Sudo now executes the command with a new group vector based on the group database which is consistent with how su(1) operates. * Fixed a double free in the SSSD back-end that could occur when ipa_hostname is present in sssd.conf and is set to an unqualified host name. * When I/O logging is enabled, sudo will now write to the terminal even when it is a background process. Previously, sudo would only write to the tty when it was the foreground process when I/O logging was enabled. If the TOSTOP terminal flag is set, sudo will suspend the command (and then itself) with the SIGTTOU signal. * A new authfail_message sudoers option that overrides the default N incorrect password attempt(s). * An empty sudoRunAsUser attribute in the LDAP and SSSD backends will now match the invoking user. This is more consistent with how an empty runas user in the sudoers file is treated. * Documented that in check mode, visudo does not check the owner / mode on files specified with the -f flag * It is now an error to specify the runas user as an empty string on the command line. Previously, an empty runas user was treated the same as an unspecified runas user * When timestamp_type option is set to tty and a terminal is present, the time stamp record will now include the start time of the session leader. When the timestamp_type option is set to ppid or when no terminal is available, the start time of the parent process is used instead. This significantly reduces the likelihood of a time stamp record being re-used when a user logs out and back in again. * The sudoers time stamp file format is now documented in the new sudoers_timestamp manual. * Visudo will now use the SUDO_EDITOR environment variable (if present) in addition to VISUAL and EDITOR. - rebase sudoers2ldif-env.patch - cleanup with spec-cleaner OBS-URL: https://build.opensuse.org/request/show/568794 OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=130
This commit is contained in:
parent
c2d7e5850a
commit
fc0b553ce4
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:74c5746cd33a814e2431c39faf0d76f7f8a697379bd073862e3b156cf0d76368
|
||||
size 2976081
|
Binary file not shown.
3
sudo-1.8.22.tar.gz
Normal file
3
sudo-1.8.22.tar.gz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:7256cb27c20883b14360eddbd17f98922073d104b214cf65aeacf1d9c9b9fd02
|
||||
size 3029051
|
BIN
sudo-1.8.22.tar.gz.sig
Normal file
BIN
sudo-1.8.22.tar.gz.sig
Normal file
Binary file not shown.
65
sudo.changes
65
sudo.changes
@ -1,3 +1,68 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Jan 24 00:44:24 UTC 2018 - avindra@opensuse.org
|
||||
|
||||
- Update to 1.8.22
|
||||
* Commands run in the background from a script run via sudo will
|
||||
no longer receive SIGHUP when the parent exits and I/O logging
|
||||
is enabled
|
||||
* A particularly offensive insult is now disabled by default
|
||||
* The description of sudo -i now correctly documents that the
|
||||
env_keep and env_check sudoers options are applied to the
|
||||
environment
|
||||
* Fixed a crash when the system's host name is not set
|
||||
* The sudoers2ldif script now handles #include and #includedir
|
||||
directives.
|
||||
* Fixed a bug where sudo would silently exit when the command
|
||||
was not allowed by sudoers and the passwd_tries sudoers option
|
||||
was set to a value less than one.
|
||||
* Fixed a bug with the listpw and verifypw sudoers options and
|
||||
multiple sudoers sources. If the option is set to all a
|
||||
password should be required unless none of a user's sudoers
|
||||
entries from any source require authentication.
|
||||
* Fixed a bug with the listpw and verifypw sudoers options in
|
||||
the LDAP and SSSD back-ends. If the option is set to any and
|
||||
the entry contained multiple rules, only the first matching
|
||||
rule was checked. If an entry contained more than one matching
|
||||
rule and the first rule required authentication but a
|
||||
subsequent rule did not, sudo would prompt for a password when
|
||||
it should not have.
|
||||
* When running a command as the invoking user (not root), sudo
|
||||
would execute the command with the same group vector it was
|
||||
started with. Sudo now executes the command with a new group
|
||||
vector based on the group database which is consistent with how
|
||||
su(1) operates.
|
||||
* Fixed a double free in the SSSD back-end that could occur when
|
||||
ipa_hostname is present in sssd.conf and is set to an unqualified
|
||||
host name.
|
||||
* When I/O logging is enabled, sudo will now write to the terminal
|
||||
even when it is a background process. Previously, sudo would only
|
||||
write to the tty when it was the foreground process when I/O
|
||||
logging was enabled. If the TOSTOP terminal flag is set, sudo
|
||||
will suspend the command (and then itself) with the SIGTTOU signal.
|
||||
* A new authfail_message sudoers option that overrides the default
|
||||
N incorrect password attempt(s).
|
||||
* An empty sudoRunAsUser attribute in the LDAP and SSSD backends
|
||||
will now match the invoking user. This is more consistent with
|
||||
how an empty runas user in the sudoers file is treated.
|
||||
* Documented that in check mode, visudo does not check the owner /
|
||||
mode on files specified with the -f flag
|
||||
* It is now an error to specify the runas user as an empty string
|
||||
on the command line. Previously, an empty runas user was treated
|
||||
the same as an unspecified runas user
|
||||
* When timestamp_type option is set to tty and a terminal is
|
||||
present, the time stamp record will now include the start time
|
||||
of the session leader. When the timestamp_type option is set
|
||||
to ppid or when no terminal is available, the start time of the
|
||||
parent process is used instead. This significantly reduces the
|
||||
likelihood of a time stamp record being re-used when a user logs
|
||||
out and back in again.
|
||||
* The sudoers time stamp file format is now documented in the new
|
||||
sudoers_timestamp manual.
|
||||
* Visudo will now use the SUDO_EDITOR environment variable (if
|
||||
present) in addition to VISUAL and EDITOR.
|
||||
- rebase sudoers2ldif-env.patch
|
||||
- cleanup with spec-cleaner
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Dec 11 13:38:25 UTC 2017 - kstreitova@suse.com
|
||||
|
||||
|
27
sudo.spec
27
sudo.spec
@ -1,7 +1,7 @@
|
||||
#
|
||||
# spec file for package sudo
|
||||
#
|
||||
# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||
# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
Name: sudo
|
||||
Version: 1.8.21p2
|
||||
Version: 1.8.22
|
||||
Release: 0
|
||||
Summary: Execute some commands as root
|
||||
License: ISC
|
||||
@ -43,7 +43,6 @@ BuildRequires: systemd-rpm-macros
|
||||
BuildRequires: zlib-devel
|
||||
Requires(pre): coreutils
|
||||
Requires(pre): permissions
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
|
||||
%description
|
||||
Sudo is a command that allows users to execute some commands as root.
|
||||
@ -76,7 +75,7 @@ Tests for fate#313276
|
||||
%patch1 -p1
|
||||
|
||||
%build
|
||||
%ifarch s390 s390x %sparc
|
||||
%ifarch s390 s390x %{sparc}
|
||||
F_PIE=-fPIE
|
||||
%else
|
||||
F_PIE=-fpie
|
||||
@ -102,7 +101,7 @@ export LDFLAGS="-pie"
|
||||
--with-sudoers-mode=0440 \
|
||||
--with-env-editor \
|
||||
--without-secure-path \
|
||||
--with-passprompt="[sudo] password for %p: " \
|
||||
--with-passprompt="[sudo] password for %{p}: " \
|
||||
--with-rundir=%{_localstatedir}/lib/sudo \
|
||||
--with-sssd
|
||||
make %{?_smp_mflags}
|
||||
@ -145,15 +144,15 @@ chmod 0440 %{_sysconfdir}/sudoers
|
||||
%verify_permissions -e %{_bindir}/sudo
|
||||
|
||||
%files -f %{name}.lang
|
||||
%defattr(-,root,root)
|
||||
%doc %{_docdir}/%{name}
|
||||
%{_mandir}/man5/sudoers.5*
|
||||
%{_mandir}/man5/sudo.conf.5*
|
||||
%{_mandir}/man5/sudoers.ldap.5*
|
||||
%{_mandir}/man8/sudo.8*
|
||||
%{_mandir}/man8/sudoedit.8*
|
||||
%{_mandir}/man8/sudoreplay.8*
|
||||
%{_mandir}/man8/visudo.8*
|
||||
%{_mandir}/man5/sudoers.5%{ext_man}
|
||||
%{_mandir}/man5/sudo.conf.5%{ext_man}
|
||||
%{_mandir}/man5/sudoers.ldap.5%{ext_man}
|
||||
%{_mandir}/man5/sudoers_timestamp.5%{ext_man}
|
||||
%{_mandir}/man8/sudo.8%{ext_man}
|
||||
%{_mandir}/man8/sudoedit.8%{ext_man}
|
||||
%{_mandir}/man8/sudoreplay.8%{ext_man}
|
||||
%{_mandir}/man8/visudo.8%{ext_man}
|
||||
|
||||
%config(noreplace) %attr(0440,root,root) %{_sysconfdir}/sudoers
|
||||
%dir %{_sysconfdir}/sudoers.d
|
||||
@ -179,7 +178,6 @@ chmod 0440 %{_sysconfdir}/sudoers
|
||||
%ghost %{_localstatedir}/lib/sudo/ts
|
||||
|
||||
%files devel
|
||||
%defattr(-,root,root)
|
||||
%doc plugins/sample/sample_plugin.c
|
||||
%{_includedir}/sudo_plugin.h
|
||||
%{_mandir}/man8/sudo_plugin.8*
|
||||
@ -187,7 +185,6 @@ chmod 0440 %{_sysconfdir}/sudoers
|
||||
%{_libexecdir}/%{name}/*.la
|
||||
|
||||
%files test
|
||||
%defattr(-,root, root)
|
||||
%{_localstatedir}/lib/tests
|
||||
%{_docdir}/%{name}-test/
|
||||
|
||||
|
@ -1,10 +1,10 @@
|
||||
Index: sudo-1.8.7/plugins/sudoers/sudoers2ldif
|
||||
Index: b/plugins/sudoers/sudoers2ldif
|
||||
===================================================================
|
||||
--- sudo-1.8.7.orig/plugins/sudoers/sudoers2ldif
|
||||
+++ sudo-1.8.7/plugins/sudoers/sudoers2ldif
|
||||
--- a/plugins/sudoers/sudoers2ldif
|
||||
+++ b/plugins/sudoers/sudoers2ldif
|
||||
@@ -1,4 +1,4 @@
|
||||
-#!/usr/bin/env perl
|
||||
+#!/usr/bin/perl
|
||||
#
|
||||
# Copyright (c) 2007, 2010-2011, 2013 Todd C. Miller <Todd.Miller@courtesan.com>
|
||||
# Copyright (c) 2007, 2010-2011, 2013 Todd C. Miller <Todd.Miller@sudo.ws>
|
||||
#
|
||||
|
Loading…
x
Reference in New Issue
Block a user