SHA256
1
0
forked from pool/sudo

Accepting request 256807 from Base:System

1

OBS-URL: https://build.opensuse.org/request/show/256807
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=67
This commit is contained in:
Stephan Kulow 2014-10-29 20:08:48 +00:00 committed by Git OBS Bridge
commit f1e27a5a46
5 changed files with 118 additions and 31 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:6eda135fa68163108f1c24de6975de5ddb09d75730bb62d6390bda7b04345400
size 2262370

3
sudo-1.8.11p1.tar.gz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:44c275772595a119185336164bb76b6e08f23d38aa0fe0d6bab48812e75d6a43
size 2402012

View File

@ -1,8 +1,6 @@
Index: sudo-1.8.9p3/plugins/sudoers/sudoers.in --- plugins/sudoers/sudoers.in 2014-09-23 12:40:15.000000000 -0400
=================================================================== +++ sudo-1.8.11p1/plugins/sudoers/sudoers.in 2014-10-10 20:52:15.870635442 -0400
--- sudo-1.8.9p3.orig/plugins/sudoers/sudoers.in 2014-01-07 19:08:50.000000000 +0100 @@ -32,37 +32,36 @@
+++ sudo-1.8.9p3/plugins/sudoers/sudoers.in 2014-01-14 12:06:45.178813991 +0100
@@ -31,37 +31,38 @@
## ##
## Defaults specification ## Defaults specification
## ##
@ -29,6 +27,7 @@ Index: sudo-1.8.9p3/plugins/sudoers/sudoers.in
-## Uncomment to enable special input methods. Care should be taken as -## Uncomment to enable special input methods. Care should be taken as
-## this may allow users to subvert the command being run via sudo. -## this may allow users to subvert the command being run via sudo.
-# Defaults env_keep += "XMODIFIERS GTK_IM_MODULE QT_IM_MODULE QT_IM_SWITCHER" -# Defaults env_keep += "XMODIFIERS GTK_IM_MODULE QT_IM_MODULE QT_IM_SWITCHER"
-##
+## Prevent environment variables from influencing programs in an +## Prevent environment variables from influencing programs in an
+## unexpected or harmful way (CVE-2005-2959, CVE-2005-4158, CVE-2006-0151) +## unexpected or harmful way (CVE-2005-2959, CVE-2005-4158, CVE-2006-0151)
+Defaults always_set_home +Defaults always_set_home
@ -36,36 +35,34 @@ Index: sudo-1.8.9p3/plugins/sudoers/sudoers.in
+Defaults secure_path="/usr/sbin:/usr/bin:/sbin:/bin" +Defaults secure_path="/usr/sbin:/usr/bin:/sbin:/bin"
+Defaults env_reset +Defaults env_reset
+## Change env_reset to !env_reset in previous line to keep all environment variables +## Change env_reset to !env_reset in previous line to keep all environment variables
+## Following list will no longer be necessary after this change +## Following list will no longer be nevessary after this change
+ +Defaults env_keep = "LANG LC_ADDRESS LC_CTYPE LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE LC_ATIME LC_ALL LANGUAGE LINGUAS XDG_SESSION_COOKIE"
+Defaults env_keep = "LANG LC_ADDRESS LC_CTYPE LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE LC_TIME LC_ALL LANGUAGE LINGUAS XDG_SESSION_COOKIE"
+## Comment out the preceding line and uncomment the following one if you need +## Comment out the preceding line and uncomment the following one if you need
+## to use special input methods. This may allow users to compromise the root +## to use special input methods. This may allow users to compromise the root
+## account if they are allowed to run commands without authentication. +## account if they are allowed to run commands without authentication.
+#Defaults env_keep = "LANG LC_ADDRESS LC_CTYPE LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE LC_TIME LC_ALL LANGUAGE LINGUAS XDG_SESSION_COOKIE XMODIFIERS GTK_IM_MODULE QT_IM_MODULE QT_IM_SWITCHER" +#Defaults env_keep = "LANG LC_ADDRESS LC_CTYPE LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE LC_ATIME LC_ALL LANGUAGE LINGUAS XDG_SESSION_COOKIE"
+ +
+## Do not insult users when they enter an incorrect password. +## Do not insult users when they enter an incorrect password.
+Defaults !insults +Defaults !insults
+ +
##
## Uncomment to enable logging of a command's output, except for ## Uncomment to enable logging of a command's output, except for
## sudoreplay and reboot. Use sudoreplay to play back logged sessions. ## sudoreplay and reboot. Use sudoreplay to play back logged sessions.
# Defaults log_output # Defaults log_output
# Defaults!/usr/bin/sudoreplay !log_output # Defaults!/usr/bin/sudoreplay !log_output
-# Defaults!/usr/local/bin/sudoreplay !log_output -# Defaults!/usr/local/bin/sudoreplay !log_output
# Defaults!/sbin/reboot !log_output # Defaults!REBOOT !log_output
+## In the default (unconfigured) configuration, sudo asks for the root password. +## In the default (unconfigured) configuration, sudo asks for the root password.
+## This allows use of an ordinary user account for administration of a freshly +## This allows use of an ordinary user account for administration of a freshly
+## installed system. When configuring sudo, delete the two +## installed system. When configuring sudo, delete the two
+## following lines: +## following lines:
+Defaults targetpw # ask for the password of the target user i.e. root +Defaults targetpw # ask for the password of the target user i.e. root
+ALL ALL=(ALL) ALL # WARNING! Only use this together with 'Defaults targetpw'! +ALL ALL=(ALL) ALL # WARNING! Only use this together with 'Defaults targetpw'!
+ +
## ##
## Runas alias specification ## Runas alias specification
## ##
@@ -77,14 +78,6 @@ root ALL=(ALL) ALL @@ -78,14 +77,6 @@
## Same thing without a password ## Same thing without a password
# %wheel ALL=(ALL) NOPASSWD: ALL # %wheel ALL=(ALL) NOPASSWD: ALL
@ -80,11 +77,9 @@ Index: sudo-1.8.9p3/plugins/sudoers/sudoers.in
## Read drop-in files from @sysconfdir@/sudoers.d ## Read drop-in files from @sysconfdir@/sudoers.d
## (the '#' here does not indicate a comment) ## (the '#' here does not indicate a comment)
#includedir @sysconfdir@/sudoers.d #includedir @sysconfdir@/sudoers.d
Index: sudo-1.8.9p3/doc/sudoers.mdoc.in --- doc/sudoers.mdoc.in 2014-09-23 12:40:15.000000000 -0400
=================================================================== +++ sudo-1.8.11p1/doc/sudoers.mdoc.in 2014-10-10 20:56:18.439618855 -0400
--- sudo-1.8.9p3.orig/doc/sudoers.mdoc.in 2014-01-07 19:08:50.000000000 +0100 @@ -1661,7 +1661,7 @@
+++ sudo-1.8.9p3/doc/sudoers.mdoc.in 2014-01-14 11:46:33.718336561 +0100
@@ -1609,7 +1609,7 @@ is present in the
.Em env_keep .Em env_keep
list. list.
This flag is This flag is
@ -93,7 +88,7 @@ Index: sudo-1.8.9p3/doc/sudoers.mdoc.in
by default. by default.
.It authenticate .It authenticate
If set, users must authenticate themselves via a password (or other If set, users must authenticate themselves via a password (or other
@@ -1910,7 +1910,7 @@ If set, @@ -1975,7 +1975,7 @@
.Nm sudo .Nm sudo
will insult users when they enter an incorrect password. will insult users when they enter an incorrect password.
This flag is This flag is
@ -102,7 +97,7 @@ Index: sudo-1.8.9p3/doc/sudoers.mdoc.in
by default. by default.
.It log_host .It log_host
If set, the host name will be logged in the (non-syslog) If set, the host name will be logged in the (non-syslog)
@@ -2363,7 +2363,7 @@ database as an argument to the @@ -2436,7 +2436,7 @@
.Fl u .Fl u
option. option.
This flag is This flag is

View File

@ -1,3 +1,77 @@
-------------------------------------------------------------------
Sat Oct 11 02:09:17 UTC 2014 - tabraham@suse.com
- refresh sudo-sudoers.patch
- update to 1.8.11p1
* Fixed a compilation problem on some systems when the
--disable-shared-libutil configure option was specified.
* The user can no longer interrupt the sleep after an incorrect password on
PAM systems using pam_unix. Bug #666.
* Fixed a compilation problem on Linux systems that do not use PAM. Bug #667.
* "make install" will now work with the stock GNU autotools install-sh
script. Bug #669.
* Fixed a crash with "sudo -i" when the current working directory does not
exist. Bug #670.
* Fixed a potential crash in the debug subsystem when logging a message
larger that 1024 bytes.
* Fixed a "make check" failure for ttyname when stdin is closed and stdout
and stderr are redirected to a different tty. Bug #643.
* Added BASH_FUNC_* to environment blacklist to match newer-style bash
functions.
- changes from 1.8.11
* The sudoers plugin no longer uses setjmp/longjmp to recover from fatal
errors. All errors are now propagated to the caller via return codes.
* When running a command in the background, sudo will now forward SIGINFO to
the command (if supported).
* Sudo will now use the system versions of the sha2 functions from libc or
libmd if available.
* Visudo now works correctly on GNU Hurd. Bug #647.
* Fixed suspend and resume of curses programs on some system when the
command is not being run in a pseudo-terminal. Bug #649.
* Fixed a crash with LDAP-based sudoers on some systems when Kerberos was
enabled.
* Sudo now includes optional Solaris audit support.
* Catalan translation for sudoers from translationproject.org.
* Norwegian Bokmaal translation for sudo from translationproject.org.
* Greek translation for sudoers from translationproject.org
* The sudo source tree has been reorganized to more closely resemble that of
other gettext-enabled packages.
* Sudo and its associated programs now link against a shared version of
libsudo_util. The --disable-shared-libutil configure option may be used to
force static linking if the --enable-static-sudoers option is also
specified.
* The passwords in ldap.conf and ldap.secret may now be encoded in base64.
* Audit updates. SELinux role changes are now audited. For sudoedit, we now
audit the actual editor being run, instead of just the sudoedit command.
* Fixed bugs in the man page post-processing that could cause portions of the
manuals to be removed.
* Fixed a crash in the system_group plugin. Bug #653.
* Fixed sudoedit on platforms without a native version of the getprogname()
function. Bug #654.
* Fixed compilation problems with some pre-C99 compilers.
* Fixed sudo's -C option which was broken in version 1.8.9.
* It is now possible to match an environment variable's value as well as its
name using env_keep and env_check. This can be used to preserve bash
functions which would otherwise be removed from the environment.
* New files created via sudoedit as a non-root user now have the proper
group id. Bug #656.
* Sudoedit now works correctly in conjunction with sudo's SELinux RBAC
support. Temporary files are now created with the proper security context.
* The sudo I/O logging plugin API has been updated. If a logging function
returns an error, the command will be terminated and all of the plugin's
logging functions will be disabled. If a logging function rejects the
command's output it will no longer be displayed to the user's terminal.
* Fixed a compilation error on systems that lack openpty(), _getpty() and
grantpt(). Bug #660.
* Fixed a hang when a sudoers source is listed more than once in a single
sudoers nsswitch.conf entry.
* On AIX, shell scripts without a #! magic number are now passed to
/usr/bin/sh, not /usr/bin/bsh. This is consistent with what the execvp()
function on AIX does and matches historic sudo behavior. Bug #661.
* Fixed a cross-compilation problem building mksiglist and mksigname.
Bug #662.
------------------------------------------------------------------- -------------------------------------------------------------------
Thu May 15 13:00:31 UTC 2014 - vcizek@suse.com Thu May 15 13:00:31 UTC 2014 - vcizek@suse.com

View File

@ -17,7 +17,7 @@
Name: sudo Name: sudo
Version: 1.8.10p3 Version: 1.8.11p1
Release: 0 Release: 0
Summary: Execute some commands as root Summary: Execute some commands as root
License: ISC License: ISC
@ -53,6 +53,7 @@ minutes by default).
%package devel %package devel
Summary: Header files needed for sudo plugin development Summary: Header files needed for sudo plugin development
Group: Development/Libraries/C and C++ Group: Development/Libraries/C and C++
Requires: %{name} = %{version}
%description devel %description devel
These header files are needed for building of sudo plugins. These header files are needed for building of sudo plugins.
@ -99,11 +100,11 @@ export LDFLAGS="-pie"
--without-secure-path \ --without-secure-path \
--with-passprompt='%%p\x27s password:' \ --with-passprompt='%%p\x27s password:' \
--with-rundir=%{_localstatedir}/lib/sudo \ --with-rundir=%{_localstatedir}/lib/sudo \
--with-sssd --with-sssd
make %{?_smp_mflags} make %{?_smp_mflags}
%install %install
%make_install %make_install install_uid=`id -u` install_gid=`id -g`
install -d -m 755 %{buildroot}%{_sysconfdir}/pam.d install -d -m 755 %{buildroot}%{_sysconfdir}/pam.d
install -m 644 %{SOURCE1} %{buildroot}%{_sysconfdir}/pam.d/sudo install -m 644 %{SOURCE1} %{buildroot}%{_sysconfdir}/pam.d/sudo
mv %{buildroot}%{_docdir}/%{name}/sudoers2ldif %{buildroot}%{_sbindir} mv %{buildroot}%{_docdir}/%{name}/sudoers2ldif %{buildroot}%{_sbindir}
@ -115,7 +116,7 @@ install -m 644 %{SOURCE2} %{buildroot}%{_docdir}/%{name}/
rm -f %{buildroot}%{_docdir}/%{name}/sample.pam rm -f %{buildroot}%{_docdir}/%{name}/sample.pam
rm -f %{buildroot}%{_docdir}/%{name}/sample.syslog.conf rm -f %{buildroot}%{_docdir}/%{name}/sample.syslog.conf
rm -f %{buildroot}%{_docdir}/%{name}/schema.OpenLDAP rm -f %{buildroot}%{_docdir}/%{name}/schema.OpenLDAP
rm -f %{buildroot}%{_libexecdir}/%{name}/sudoers.la
%find_lang %{name} %find_lang %{name}
%find_lang sudoers %find_lang sudoers
cat sudoers.lang >> %{name}.lang cat sudoers.lang >> %{name}.lang
@ -140,7 +141,14 @@ chmod 0440 %{_sysconfdir}/sudoers
%files -f %{name}.lang %files -f %{name}.lang
%defattr(-,root,root) %defattr(-,root,root)
%doc %{_docdir}/%{name} %doc %{_docdir}/%{name}
%doc %{_mandir}/man?/* %doc %{_mandir}/man5/sudoers.5*
%doc %{_mandir}/man5/sudo.conf.5*
%doc %{_mandir}/man5/sudoers.ldap.5*
%doc %{_mandir}/man8/sudo.8*
%doc %{_mandir}/man8/sudoedit.8*
%doc %{_mandir}/man8/sudoreplay.8*
%doc %{_mandir}/man8/visudo.8*
%config(noreplace) %attr(0440,root,root) %{_sysconfdir}/sudoers %config(noreplace) %attr(0440,root,root) %{_sysconfdir}/sudoers
%dir %{_sysconfdir}/sudoers.d %dir %{_sysconfdir}/sudoers.d
%config %{_sysconfdir}/pam.d/sudo %config %{_sysconfdir}/pam.d/sudo
@ -152,12 +160,22 @@ chmod 0440 %{_sysconfdir}/sudoers
%{_bindir}/sudoreplay %{_bindir}/sudoreplay
%{_sbindir}/visudo %{_sbindir}/visudo
%attr(0755,root,root) %{_sbindir}/sudoers2ldif %attr(0755,root,root) %{_sbindir}/sudoers2ldif
%{_libexecdir}/sudo %dir %{_libexecdir}/%{name}
%attr(0700,root,root) %dir %ghost %{_localstatedir}/lib/sudo %{_libexecdir}/%{name}/sesh
%{_libexecdir}/%{name}/sudo_noexec.so
%{_libexecdir}/%{name}/sudoers.so
%{_libexecdir}/%{name}/group_file.so
%{_libexecdir}/%{name}/system_group.so
%{_libexecdir}/%{name}/libsudo_util.so.*
%attr(0700,root,root) %dir %ghost %{_localstatedir}/lib/%{name}
%files devel %files devel
%defattr(-,root,root) %defattr(-,root,root)
%doc plugins/sample/sample_plugin.c
%{_includedir}/sudo_plugin.h %{_includedir}/sudo_plugin.h
%{_mandir}/man8/sudo_plugin.8*
%attr(0644,root,root) %{_libexecdir}/%{name}/libsudo_util.so
%{_libexecdir}/%{name}/*.la
%files test %files test
%defattr(-,root, root) %defattr(-,root, root)