Go to file
Marcus Meissner 234260b2dd Accepting request 287223 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.12 (fixes bnc#918953)
- changelog:
  * The embedded copy of zlib has been upgraded to version 1.2.8 and
    is now installed as a shared library where supported.
  * Debug settings for the sudo front end and sudoers plugin are now configured separately.
  * Multiple sudo.conf Debug entries may now be specified per program (or plugin).
  * The plugin API has been extended such that the path to the plugin
    that was loaded is now included in the settings array. This path
    can be used to register with the debugging subsystem. The debug_flags
    setting is now prefixed with a file name and may be specified multiple
    times if there is more than one matching Debug setting in sudo.conf.
  * The sudoers regression tests now run with the locale set to C since
    some of the tests compare output that includes locale-specific messages. Bug #672.
  * Fixed a bug where sudo would not run commands on Linux when compiled
    with audit support if audit is disabled. Bug #671.
  * The default password prompt now includes a trailing space after
    "Password:" for consistency with su(1) on most systems. Bug #663.
  * Visudo will now use the optional sudoers_file, sudoers_mode,
    sudoers_uid and sudoers_gid arguments if specified on the sudoers.so Plugin line in the sudo.conf file.
  * Fixed a problem introduced in sudo 1.8.8 that prevented the full
    host name from being used when the fqdn sudoers option is used. Bug #678.
  * Sudo now installs a handler for SIGCHLD signal handler immediately
    before stating the process that will execute the command (or start the monitor).
  * Removed a limit on the length of command line arguments expanded by
    a wild card using sudo's version of the fnmatch() function.
    This limit was introduced when sudo's version of fnmatch() was replaced in sudo 1.8.4.
  * LDAP-based sudoers can now query an LDAP server for a user's netgroups
    directly. This is often much faster than fetching every sudoRole object
    containing a sudoUser that begins with a `+' prefix and checking
    whether the user is a member of any of the returned netgroups.

OBS-URL: https://build.opensuse.org/request/show/287223
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=81
2015-02-22 19:18:26 +00:00
.gitattributes OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=1 2007-01-15 23:38:14 +00:00
.gitignore OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=1 2007-01-15 23:38:14 +00:00
fate_313276_test.sh Accepting request 215868 from home:vitezslav_cizek:branches:Base:System 2014-02-02 18:13:19 +00:00
README_313276.test Accepting request 215868 from home:vitezslav_cizek:branches:Base:System 2014-02-02 18:13:19 +00:00
README.SUSE OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=1 2007-01-15 23:38:14 +00:00
sudo-1.8.12.tar.gz Accepting request 287223 from home:vitezslav_cizek:branches:Base:System 2015-02-22 19:18:26 +00:00
sudo-parse_boottime_properly.patch Accepting request 265535 from home:vitezslav_cizek:branches:Base:System 2014-12-18 14:02:26 +00:00
sudo-sudoers.patch Accepting request 255758 from home:tabraham1:branches:Base:System 2014-10-16 06:00:36 +00:00
sudo.changes Accepting request 287223 from home:vitezslav_cizek:branches:Base:System 2015-02-22 19:18:26 +00:00
sudo.pamd OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=21 2009-07-16 14:55:46 +00:00
sudo.spec Accepting request 287223 from home:vitezslav_cizek:branches:Base:System 2015-02-22 19:18:26 +00:00
sudoers2ldif-env.patch - restore accidentally dropped suse-specific patches 2013-07-02 16:30:47 +00:00

In the default (ie unconfigured) configuration sudo asks for root password.
This allows to use an ordinary user account for administration of a freshly
installed system. When configuring sudo, please make sure to delete the two
following lines:

Defaults targetpw    # ask for the password of the target user i.e. root
%users ALL=(ALL) ALL # WARNING! Only use this together with 'Defaults targetpw'!