2 Commits

Author SHA256 Message Date
0b44b5e607 Accepting request 1304809 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1304809
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=155
2025-09-16 16:18:00 +00:00
cbecaf6b9a - Update to 1.9.17p2
* Fixed a bug introduced in sudo 1.9.16 that could result in sudo 
    sending SIGHUP to all processes on the system in certain rare
    cases. The bug could manifest if sudo is running a command in
    a pseudo-terminal, sudo terminates the command due to an
    internal error, and the user’s terminal is revoked. GitHub
    issue #458.
  * Fixed a bug introduced in sudo 1.9.12 that caused sudo to
    abort when the intercept and intercept_verify options are
    enabled in sudoers and either the command line arguments or
    the environment contains a string larger than the page size
    (usually 4096). This only Linux affects systems that support
    the ptrace_readv_string() function. GitHub issue #453.
  * Fixed a bug in sudo’s configure script introduced in sudo
    1.9.17 that prevented mdoc-format man pages from being used 
    on systems without the mandoc utility. Bug #1077.
- /usr/etc/sudoers and file /usr/etc/sudoers.d/50-wheel-auth-self
  both have permissions 0644, while visudo -c complains that they
  should be 0440. (bsc#1249447)
- Policy and Groups subpackages can be noarch

OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=260
2025-09-15 11:52:17 +00:00
6 changed files with 35 additions and 7 deletions

Binary file not shown.

Binary file not shown.

3
sudo-1.9.17p2.tar.gz Normal file
View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:4a38a1ab3adb1199257edc2a7c4a2bd714665eb605b04368843b06dada2cfcfb
size 5451682

BIN
sudo-1.9.17p2.tar.gz.sig Normal file

Binary file not shown.

View File

@@ -1,3 +1,27 @@
-------------------------------------------------------------------
Mon Sep 15 11:25:24 UTC 2025 - Simon Lees <sflees@suse.de>
- Update to 1.9.17p2
* Fixed a bug introduced in sudo 1.9.16 that could result in sudo
sending SIGHUP to all processes on the system in certain rare
cases. The bug could manifest if sudo is running a command in
a pseudo-terminal, sudo terminates the command due to an
internal error, and the users terminal is revoked. GitHub
issue #458.
* Fixed a bug introduced in sudo 1.9.12 that caused sudo to
abort when the intercept and intercept_verify options are
enabled in sudoers and either the command line arguments or
the environment contains a string larger than the page size
(usually 4096). This only Linux affects systems that support
the ptrace_readv_string() function. GitHub issue #453.
* Fixed a bug in sudos configure script introduced in sudo
1.9.17 that prevented mdoc-format man pages from being used
on systems without the mandoc utility. Bug #1077.
- /usr/etc/sudoers and file /usr/etc/sudoers.d/50-wheel-auth-self
both have permissions 0644, while visudo -c complains that they
should be 0440. (bsc#1249447)
- Policy and Groups subpackages can be noarch
-------------------------------------------------------------------
Mon Jun 30 19:28:17 UTC 2025 - Simon Lees <sflees@suse.de>

View File

@@ -1,7 +1,7 @@
#
# spec file for package sudo
#
# Copyright (c) 2025 SUSE LLC
# Copyright (c) 2025 SUSE LLC and contributors
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -25,7 +25,7 @@
%endif
Name: sudo
Version: 1.9.17p1
Version: 1.9.17p2
Release: 0
Summary: Execute some commands as root
License: ISC
@@ -104,6 +104,7 @@ Summary: Users in the wheel group can authenticate as admin
Group: System/Base
Requires: %{name} = %{version}
Requires: group(wheel)
BuildArch: noarch
%description policy-wheel-auth-self
Sudo authentication policy that allows users in the wheel group to
@@ -114,6 +115,7 @@ Summary: Users in the sudo group can authenticate as admin
Group: System/Base
Requires: %{name} = %{version}
Requires: group(sudo)
BuildArch: noarch
%description policy-sudo-auth-self
Sudo authentication policy that allows users in the sudo group to
@@ -122,6 +124,7 @@ authenticate as root with their own password
%package -n system-group-sudo
Summary: System group 'sudo'
Group: System/Fhs
BuildArch: noarch
%{sysusers_requires}
%description -n system-group-sudo
@@ -205,9 +208,10 @@ rm -f %{buildroot}%{confdir}/sudoers.dist
mkdir -p %{buildroot}%{_distconfdir}/sudoers.d %{buildroot}%{_sysconfdir}/sudoers.d
chmod 644 %{buildroot}%{_distconfdir}/sudoers
echo "@includedir /etc/sudoers.d" >> %{buildroot}%{_distconfdir}/sudoers
chmod 440 %{buildroot}%{_distconfdir}/sudoers
%endif
install -D -m 644 %{SOURCE8} %{buildroot}%{confdir}/sudoers.d/50-wheel-auth-self
install -D -m 440 %{SOURCE8} %{buildroot}%{confdir}/sudoers.d/50-wheel-auth-self
install -D -m 644 %{SOURCE9} %{buildroot}/usr/share/polkit-1/rules.d/51-wheel.rules
sed -e 's/wheel/sudo/g' < %{SOURCE8} > %{buildroot}%{confdir}/sudoers.d/50-sudo-auth-self
@@ -323,7 +327,7 @@ test -f %{_sysconfdir}/sudoers.rpmsave && mv -v %{_sysconfdir}/sudoers.rpmsave %
%{_localstatedir}/lib/tests
%files policy-wheel-auth-self
%{confdir}/sudoers.d/50-wheel-auth-self
%attr(0440,root,root) %{confdir}/sudoers.d/50-wheel-auth-self
%dir /usr/share/polkit-1
%dir %attr(0555,root,root) /usr/share/polkit-1/rules.d
/usr/share/polkit-1/rules.d/51-wheel.rules