diff --git a/sudo-1.7.0.tar.bz2 b/sudo-1.7.0.tar.bz2 deleted file mode 100644 index 11fafc7..0000000 --- a/sudo-1.7.0.tar.bz2 +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:f6ffca5d34235e8fd80e7811feb0e3c6aa065a15e76c95d35094feead38f7e54 -size 565584 diff --git a/sudo-1.7.0-__P.diff b/sudo-1.7.1-__P.diff similarity index 100% rename from sudo-1.7.0-__P.diff rename to sudo-1.7.1-__P.diff diff --git a/sudo-1.7.0-defaults.diff b/sudo-1.7.1-defaults.diff similarity index 100% rename from sudo-1.7.0-defaults.diff rename to sudo-1.7.1-defaults.diff diff --git a/sudo-1.7.0-env.diff b/sudo-1.7.1-env.diff similarity index 100% rename from sudo-1.7.0-env.diff rename to sudo-1.7.1-env.diff diff --git a/sudo-1.7.0-pam_rhost.diff b/sudo-1.7.1-pam_rhost.diff similarity index 100% rename from sudo-1.7.0-pam_rhost.diff rename to sudo-1.7.1-pam_rhost.diff diff --git a/sudo-1.7.0-secure_path.diff b/sudo-1.7.1-secure_path.diff similarity index 94% rename from sudo-1.7.0-secure_path.diff rename to sudo-1.7.1-secure_path.diff index 86d7706..e6152a9 100644 --- a/sudo-1.7.0-secure_path.diff +++ b/sudo-1.7.1-secure_path.diff @@ -1,12 +1,12 @@ --- env.c +++ env.c -@@ -593,7 +593,7 @@ +@@ -688,7 +688,7 @@ } } /* Replace the PATH envariable with a secure one? */ - if (def_secure_path && !user_is_exempt()) { + if (def_secure_path && !user_is_exempt() && def_env_reset) { - _sudo_setenv("PATH", def_secure_path, TRUE); + sudo_setenv("PATH", def_secure_path, TRUE); SET(didvar, DID_PATH); } --- find_path.c diff --git a/sudo-1.7.0-strip.diff b/sudo-1.7.1-strip.diff similarity index 88% rename from sudo-1.7.0-strip.diff rename to sudo-1.7.1-strip.diff index fab4b1d..7b2f54d 100644 --- a/sudo-1.7.0-strip.diff +++ b/sudo-1.7.1-strip.diff @@ -1,9 +1,9 @@ --- Makefile.in +++ Makefile.in -@@ -313,11 +313,11 @@ +@@ -415,11 +415,11 @@ $(DESTDIR)$(noexecdir) - install-binaries: $(PROGS) + install-binaries: install-dirs $(PROGS) - $(INSTALL) -O $(install_uid) -G $(install_gid) -M 4111 -s sudo $(DESTDIR)$(sudodir)/sudo + $(INSTALL) -O $(install_uid) -G $(install_gid) -M 4111 sudo $(DESTDIR)$(sudodir)/sudo rm -f $(DESTDIR)$(sudodir)/sudoedit @@ -13,5 +13,5 @@ + $(INSTALL) -O $(install_uid) -G $(install_gid) -M 0111 visudo $(DESTDIR)$(visudodir)/visudo +@SELINUX@ $(INSTALL) -O $(install_uid) -G $(install_gid) -M 0111 sesh $(DESTDIR)$(libexecdir)/sesh - install-noexec: sudo_noexec.la + install-noexec: install-dirs sudo_noexec.la test -f .libs/$(noexecfile) && $(INSTALL) -O $(install_uid) -G $(install_gid) -M 0755 .libs/$(noexecfile) $(DESTDIR)$(noexecdir) diff --git a/sudo-1.7.0-sudoers.diff b/sudo-1.7.1-sudoers.diff similarity index 100% rename from sudo-1.7.0-sudoers.diff rename to sudo-1.7.1-sudoers.diff diff --git a/sudo-1.7.0.pamd b/sudo-1.7.1.pamd similarity index 100% rename from sudo-1.7.0.pamd rename to sudo-1.7.1.pamd diff --git a/sudo-1.7.1.tar.bz2 b/sudo-1.7.1.tar.bz2 new file mode 100644 index 0000000..5d52fcf --- /dev/null +++ b/sudo-1.7.1.tar.bz2 @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1791f62663ef289597b373cda42a5be898a23ae7aea5092094264ff9f18164f6 +size 573399 diff --git a/sudo.changes b/sudo.changes index be1b681..8213f81 100644 --- a/sudo.changes +++ b/sudo.changes @@ -1,3 +1,21 @@ +------------------------------------------------------------------- +Mon Apr 27 17:37:00 CEST 2009 - prusnak@suse.cz + +- updated to 1.7.1 + * A new Defaults option "pwfeedback" will cause sudo to provide visual + feedback when the user is entering a password. + * A new Defaults option "fast_glob" will cause sudo to use the fnmatch() + function for file name globbing instead of glob(). When this option + is enabled, sudo will not check the file system when expanding wildcards. + This is faster but a side effect is that relative paths with wildcard + will no longer work. + * The file name specified with the #include directive may now include + a %h escape which is expanded to the short form of hostname. + * The -k flag may now be specified along with a command, causing the + user's timestamp file to be ignored. + * The unused alias checks in visudo now handle the case of an alias + referring to another alias. + ------------------------------------------------------------------- Mon Jan 26 13:54:15 CET 2009 - prusnak@suse.cz diff --git a/sudo.spec b/sudo.spec index 7fc4174..5c91f30 100644 --- a/sudo.spec +++ b/sudo.spec @@ -1,5 +1,5 @@ # -# spec file for package sudo (Version 1.7.0) +# spec file for package sudo (Version 1.7.1) # # Copyright (c) 2009 SUSE LINUX Products GmbH, Nuernberg, Germany. # @@ -22,7 +22,7 @@ Name: sudo BuildRequires: openldap2-devel pam-devel postfix BuildRequires: libselinux-devel PreReq: coreutils -Version: 1.7.0 +Version: 1.7.1 Release: 1 AutoReqProv: on Group: System/Base @@ -123,6 +123,21 @@ rm -rf $RPM_BUILD_ROOT /var/run/sudo %changelog +* Mon Apr 27 2009 prusnak@suse.cz +- updated to 1.7.1 + * A new Defaults option "pwfeedback" will cause sudo to provide visual + feedback when the user is entering a password. + * A new Defaults option "fast_glob" will cause sudo to use the fnmatch() + function for file name globbing instead of glob(). When this option + is enabled, sudo will not check the file system when expanding wildcards. + This is faster but a side effect is that relative paths with wildcard + will no longer work. + * The file name specified with the #include directive may now include + a %%h escape which is expanded to the short form of hostname. + * The -k flag may now be specified along with a command, causing the + user's timestamp file to be ignored. + * The unused alias checks in visudo now handle the case of an alias + referring to another alias. * Mon Jan 26 2009 prusnak@suse.cz - updated to 1.7.0 * Rewritten parser that converts sudoers into a set of data structures.