SHA256
1
0
forked from pool/sudo

206 Commits

Author SHA256 Message Date
009c0c788b Accepting request 260242 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/260242
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=68
2014-11-15 10:44:23 +00:00
647b4ec060 Accepting request 260185 from home:fstrba
Update to the latest release

OBS-URL: https://build.opensuse.org/request/show/260185
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=77
2014-11-07 12:50:48 +00:00
Stephan Kulow
f1e27a5a46 Accepting request 256807 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/256807
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=67
2014-10-29 20:08:48 +00:00
Stephan Kulow
6b58d604a8 Accepting request 255758 from home:tabraham1:branches:Base:System
update to sudo-1.8.11p1

OBS-URL: https://build.opensuse.org/request/show/255758
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=75
2014-10-16 06:00:36 +00:00
Stephan Kulow
1cceaeffd4 Accepting request 234227 from Base:System
- update to 1.8.10p3
  * Fixed expansion of the %p escape in the prompt for "sudo -l"
    when rootpw, runaspw or targetpw is set. Bug #639.
  * Fixed matching of uids and gids which was broken in version 1.8.9
  * PAM credential initialization has been re-enabled. It was
    unintentionally disabled by default in version 1.8.8. The way
    credentials are initialized has also been fixed. Bug #642.
  * Fixed a descriptor leak on Linux when determing boot time. Sudo
    normally closes extra descriptors before running a command so
    the impact is limited. Bug #645.
  * Fixed flushing of the last buffer of data when I/O logging is
    enabled. This bug, introduced in version 1.8.9, could cause
    incomplete command output on some systems. Bug #646.
  * Fixed a hang introduced in sudo 1.8.10 when timestamp_timeout
    is set to zero. Bug #638.
- don't install test LICENSE with executable perms (forwarded request 234191 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/234227
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=65
2014-05-17 04:43:30 +00:00
Stephan Kulow
8540c79227 Accepting request 234191 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.10p3
  * Fixed expansion of the %p escape in the prompt for "sudo -l"
    when rootpw, runaspw or targetpw is set. Bug #639.
  * Fixed matching of uids and gids which was broken in version 1.8.9
  * PAM credential initialization has been re-enabled. It was
    unintentionally disabled by default in version 1.8.8. The way
    credentials are initialized has also been fixed. Bug #642.
  * Fixed a descriptor leak on Linux when determing boot time. Sudo
    normally closes extra descriptors before running a command so
    the impact is limited. Bug #645.
  * Fixed flushing of the last buffer of data when I/O logging is
    enabled. This bug, introduced in version 1.8.9, could cause
    incomplete command output on some systems. Bug #646.
  * Fixed a hang introduced in sudo 1.8.10 when timestamp_timeout
    is set to zero. Bug #638.
- don't install test LICENSE with executable perms

OBS-URL: https://build.opensuse.org/request/show/234191
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=73
2014-05-15 17:33:09 +00:00
Stephan Kulow
115ee49851 Accepting request 226049 from Base:System
- update to 1.8.10p1
  * Fixed a bug with netgated commands in "sudo -l command" that
    could cause the command to be listed even when it was explicitly
    denied. This only affected list mode when a command was specified.
    Bug #636.
  * It is now possible to disable network interface probing in sudo.conf
    by changing the value of the probe_interfaces setting.
  * When listing a user's privileges (sudo -l), the sudoers plugin
    will now prompt for the user's password even if the targetpw,
    rootpw or runaspw options are set.
  * The sudoers plugin uses a new format for its time stamp files.
    Bug #616.
  * sudo's -K option will now remove all of the user's time stamps,
    not just the time stamp for the current terminal.
    The -k option can be used to only disable time stamps for
    the current terminal.
  * If sudo was started in the background and needed to prompt for a
    password, it was not possible to suspend it at the password prompt
  * LDAP-based sudoers now uses a default search filter of
    (objectClass=sudoRole) for more efficient queries.
    The netgroup query has been modified to avoid falling below the
    minimum length for OpenLDAP substring indices.
  * The new use_netgroups sudoers option can be used to explicitly
    enable or disable netgroups support. For LDAP-based sudoers,
    netgroup support requires an expensive substring match on the server.
    If netgroups are not needed, this option can be disabled to
    reduce the load on the LDAP server.
  * Sudo is once again able to open the sudoers file when the group
    on sudoers doesn't match the expected value, so long as the
    file is not group writable. (forwarded request 225988 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/226049
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=64
2014-03-18 15:21:18 +00:00
Stephan Kulow
c78d53b990 Accepting request 225988 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.10p1
  * Fixed a bug with netgated commands in "sudo -l command" that
    could cause the command to be listed even when it was explicitly
    denied. This only affected list mode when a command was specified.
    Bug #636.
  * It is now possible to disable network interface probing in sudo.conf
    by changing the value of the probe_interfaces setting.
  * When listing a user's privileges (sudo -l), the sudoers plugin
    will now prompt for the user's password even if the targetpw,
    rootpw or runaspw options are set.
  * The sudoers plugin uses a new format for its time stamp files.
    Bug #616.
  * sudo's -K option will now remove all of the user's time stamps,
    not just the time stamp for the current terminal.
    The -k option can be used to only disable time stamps for
    the current terminal.
  * If sudo was started in the background and needed to prompt for a
    password, it was not possible to suspend it at the password prompt
  * LDAP-based sudoers now uses a default search filter of
    (objectClass=sudoRole) for more efficient queries.
    The netgroup query has been modified to avoid falling below the
    minimum length for OpenLDAP substring indices.
  * The new use_netgroups sudoers option can be used to explicitly
    enable or disable netgroups support. For LDAP-based sudoers,
    netgroup support requires an expensive substring match on the server.
    If netgroups are not needed, this option can be disabled to
    reduce the load on the LDAP server.
  * Sudo is once again able to open the sudoers file when the group
    on sudoers doesn't match the expected value, so long as the
    file is not group writable.

OBS-URL: https://build.opensuse.org/request/show/225988
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=71
2014-03-15 06:41:25 +00:00
Stephan Kulow
e23062cdbd Accepting request 220617 from Base:System
- added subpackage with a test for fate#313276 (forwarded request 215868 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/220617
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=63
2014-02-03 10:40:47 +00:00
Stephan Kulow
2e20424a47 Accepting request 215868 from home:vitezslav_cizek:branches:Base:System
- added subpackage with a test for fate#313276

OBS-URL: https://build.opensuse.org/request/show/215868
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=69
2014-02-02 18:13:19 +00:00
Stephan Kulow
2da245d3f4 Accepting request 215577 from Base:System
- update to 1.8.9p4
  * Fixed a bug where sudo could consume large amounts of CPU while
    the command was running when I/O logging is not enabled.
    Bug #631 (bnc#861153)
  * Fixed a bug where sudo would exit with an error when the debug
    level is set to util@debug or all@debug and I/O logging is not
    enabled. The command would continue runnning after sudo exited. (forwarded request 215575 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/215577
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=62
2014-01-30 05:55:47 +00:00
Vítězslav Čížek
9d9232ee84 Accepting request 215575 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.9p4
  * Fixed a bug where sudo could consume large amounts of CPU while
    the command was running when I/O logging is not enabled.
    Bug #631 (bnc#861153)
  * Fixed a bug where sudo would exit with an error when the debug
    level is set to util@debug or all@debug and I/O logging is not
    enabled. The command would continue runnning after sudo exited.

OBS-URL: https://build.opensuse.org/request/show/215575
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=67
2014-01-29 19:59:03 +00:00
Stephan Kulow
0b1c91b96f Accepting request 213957 from Base:System
- update to 1.8.9p3
- set secure_path to /usr/sbin:/usr/bin:/sbin:/bin
- changes since 1.8.8:
  * Fixed a bug introduced in sudo 1.8.9 that prevented the tty name
    from being resolved properly on Linux systems.  Bug #630.
  * Updated config.guess, config.sub and libtool to support the ppc64le
    architecture (IBM PowerPC Little Endian).
  * Fixed a problem with gcc 4.8's handling of bit fields that could
    lead to the noexec flag being enabled even when it was not
    explicitly set.
  * Reworked sudo's main event loop to use a simple event subsystem
    using poll(2) or select(2) as the back end.
  * It is now possible to statically compile the sudoers plugin into
    the sudo binary without disabling shared library support.  The
    sudo.conf file may still be used to configure other plugins.
  * Sudo can now be compiled again with a C preprocessor that does
    not support variadic macros.
  * Visudo can now export a sudoers file in JSON format using the
    new -x flag.
  * The locale is now set correctly again for visudo and sudoreplay.
  * The plugin API has been extended to allow the plugin to exclude
    specific file descriptors from the "closefrom" range.
  * There is now a workaround for a Solaris-specific problem where
    NOEXEC was overriding traditional root DAC behavior.
  * Add user netgroup filtering for SSSD. Previously, rules for
    a netgroup were applied to all even when they did not belong
    to the specified netgroup.
  * On systems with BSD login classes, if the user specified a group
    (not a user) to run the command as, it was possible to specify
    a different login class even when the command was not run as the (forwarded request 213857 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/213957
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=61
2014-01-17 10:16:49 +00:00
27d016fa1b Accepting request 213857 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.9p3
- set secure_path to /usr/sbin:/usr/bin:/sbin:/bin
- changes since 1.8.8:
  * Fixed a bug introduced in sudo 1.8.9 that prevented the tty name
    from being resolved properly on Linux systems.  Bug #630.
  * Updated config.guess, config.sub and libtool to support the ppc64le
    architecture (IBM PowerPC Little Endian).
  * Fixed a problem with gcc 4.8's handling of bit fields that could
    lead to the noexec flag being enabled even when it was not
    explicitly set.
  * Reworked sudo's main event loop to use a simple event subsystem
    using poll(2) or select(2) as the back end.
  * It is now possible to statically compile the sudoers plugin into
    the sudo binary without disabling shared library support.  The
    sudo.conf file may still be used to configure other plugins.
  * Sudo can now be compiled again with a C preprocessor that does
    not support variadic macros.
  * Visudo can now export a sudoers file in JSON format using the
    new -x flag.
  * The locale is now set correctly again for visudo and sudoreplay.
  * The plugin API has been extended to allow the plugin to exclude
    specific file descriptors from the "closefrom" range.
  * There is now a workaround for a Solaris-specific problem where
    NOEXEC was overriding traditional root DAC behavior.
  * Add user netgroup filtering for SSSD. Previously, rules for
    a netgroup were applied to all even when they did not belong
    to the specified netgroup.
  * On systems with BSD login classes, if the user specified a group
    (not a user) to run the command as, it was possible to specify
    a different login class even when the command was not run as the

OBS-URL: https://build.opensuse.org/request/show/213857
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=65
2014-01-15 10:13:18 +00:00
Tomáš Chvátal
e4d66cd544 Accepting request 202629 from Base:System
- update to 1.8.8
- drop sudo-plugins-sudoers-sssd.patch (upstream)
  * Removed a warning on PAM systems with stacked auth modules
    where the first module on the stack does not succeed.
  * Sudo, sudoreplay and visudo now support GNU-style long options.
  * The -h (--host) option may now be used to specify a host name.
    This is currently only used by the sudoers plugin in conjunction
    with the -l (--list) option.
  * Sudo's LDAP SASL support now works properly with Kerberos.
    Previously, the SASL library was unable to locate the user's
    credential cache.
  * It is now possible to set the nproc resource limit to unlimited
    via pam_limits on Linux (bug #565).
  * New "pam_service" and "pam_login_service" sudoers options
    that can be used to specify the PAM service name to use.
  * New "pam_session" and "pam_setcred" sudoers options that
    can be used to disable PAM session and credential support.
  * The sudoers plugin now properly supports UIDs and GIDs
    that are larger than 0x7fffffff on 32-bit platforms.
  * Fixed a visudo bug introduced in sudo 1.8.7 where per-group
    Defaults entries would cause an internal error.
  * If the "tty_tickets" sudoers option is enabled (the default),
    but there is no tty present, sudo will now use a ticket file
    based on the parent process ID.  This makes it possible to support
    the normal timeout behavior for the session.
  * Fixed a problem running commands that change their process
    group and then attempt to change the terminal settings when not
    running the command in a pseudo-terminal.  Previously, the process
    would receive SIGTTOU since it was effectively a background
    process.  Sudo will now grant the child the controlling tty and (forwarded request 202594 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/202629
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=60
2013-10-08 18:35:01 +00:00
cf6621d369 Accepting request 202594 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.8
- drop sudo-plugins-sudoers-sssd.patch (upstream)
  * Removed a warning on PAM systems with stacked auth modules
    where the first module on the stack does not succeed.
  * Sudo, sudoreplay and visudo now support GNU-style long options.
  * The -h (--host) option may now be used to specify a host name.
    This is currently only used by the sudoers plugin in conjunction
    with the -l (--list) option.
  * Sudo's LDAP SASL support now works properly with Kerberos.
    Previously, the SASL library was unable to locate the user's
    credential cache.
  * It is now possible to set the nproc resource limit to unlimited
    via pam_limits on Linux (bug #565).
  * New "pam_service" and "pam_login_service" sudoers options
    that can be used to specify the PAM service name to use.
  * New "pam_session" and "pam_setcred" sudoers options that
    can be used to disable PAM session and credential support.
  * The sudoers plugin now properly supports UIDs and GIDs
    that are larger than 0x7fffffff on 32-bit platforms.
  * Fixed a visudo bug introduced in sudo 1.8.7 where per-group
    Defaults entries would cause an internal error.
  * If the "tty_tickets" sudoers option is enabled (the default),
    but there is no tty present, sudo will now use a ticket file
    based on the parent process ID.  This makes it possible to support
    the normal timeout behavior for the session.
  * Fixed a problem running commands that change their process
    group and then attempt to change the terminal settings when not
    running the command in a pseudo-terminal.  Previously, the process
    would receive SIGTTOU since it was effectively a background
    process.  Sudo will now grant the child the controlling tty and

OBS-URL: https://build.opensuse.org/request/show/202594
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=63
2013-10-08 15:16:17 +00:00
Stephan Kulow
fbafe42fa5 Accepting request 182936 from Base:System
- fix the default flag settings in manual to reflect changes caused by
  sudo-sudoers.patch (bnc#823292) (forwarded request 182920 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/182936
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=58
2013-07-16 05:39:30 +00:00
f2a6be94a4 Accepting request 182920 from home:vitezslav_cizek:branches:Base:System
- fix the default flag settings in manual to reflect changes caused by
  sudo-sudoers.patch (bnc#823292)

OBS-URL: https://build.opensuse.org/request/show/182920
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=61
2013-07-12 14:58:55 +00:00
Stephan Kulow
589f9646a5 Accepting request 182711 from Base:System
- Added patch to resolve packaging error. Patch has been sent
  upstream.
  * E: sudo 64bit-portability-issue ./sssd.c:829

- Enable SSSD as a sudoers data source (forwarded request 182674 from deadpoint)

OBS-URL: https://build.opensuse.org/request/show/182711
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=57
2013-07-11 11:34:17 +00:00
3c05058870 Accepting request 182674 from home:deadpoint:branches:Base:System
- Added patch to resolve packaging error. Patch has been sent
  upstream.
  * E: sudo 64bit-portability-issue ./sssd.c:829

- Enable SSSD as a sudoers data source

OBS-URL: https://build.opensuse.org/request/show/182674
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=59
2013-07-10 11:58:09 +00:00
Stephan Kulow
96be893e29 Accepting request 181790 from Base:System
- restore accidentally dropped suse-specific patches 

  * remove CVE-2013-1775
  * remove CVE-2013-1776
  * The non-Unix group plugin is now supported when sudoers data is stored in LDAP.
  * User messages are now always displayed in the user's locale, even when the
  same message is being logged or mailed in a different locale.  
  * Log files created by sudo now explicitly have the group set to group ID 0
  rather than relying on BSD group semantics (which may not be the default).
  * A new exec_background sudoers option can be used to initially run the 
  command without read access to the terminal when running a command in a 
  pseudo-tty. 
  * Sudo now produces better error messages when there is an error in the sudo.conf file.
  * Two new settings have been added to sudo.conf to give the admin better control of 
  how group database queries are performed.
  * There is now a standalone sudo.conf manual page.
  * New support for specifying a SHA-2 digest along with the command in sudoers.
  Supported hash types are sha224, sha256, sha384 and sha512. See the description
  of Digest_Spec in the sudoers manual or the description of sudoCommand in the
  sudoers.ldap manual for details.
  * Fixed potential false positives in visudo's alias cycle detection.
  * Sudo now only builds Position Independent Executables (PIE) by default on Linux
  systems and verifies that a trivial test program builds and runs.

OBS-URL: https://build.opensuse.org/request/show/181790
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=56
2013-07-03 08:27:44 +00:00
83cffef23c OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=57 2013-07-02 16:37:53 +00:00
313affb53e * remove CVE-2013-1775
* remove CVE-2013-1776
  * The non-Unix group plugin is now supported when sudoers data is stored in LDAP.
  * User messages are now always displayed in the user's locale, even when the
  same message is being logged or mailed in a different locale.  
  * Log files created by sudo now explicitly have the group set to group ID 0
  rather than relying on BSD group semantics (which may not be the default).
  * A new exec_background sudoers option can be used to initially run the 
  command without read access to the terminal when running a command in a 
  pseudo-tty. 
  * Sudo now produces better error messages when there is an error in the sudo.conf file.
  * Two new settings have been added to sudo.conf to give the admin better control of 
  how group database queries are performed.
  * There is now a standalone sudo.conf manual page.
  * New support for specifying a SHA-2 digest along with the command in sudoers.
  Supported hash types are sha224, sha256, sha384 and sha512. See the description
  of Digest_Spec in the sudoers manual or the description of sudoCommand in the
  sudoers.ldap manual for details.
  * Fixed potential false positives in visudo's alias cycle detection.
  * Sudo now only builds Position Independent Executables (PIE) by default on Linux
  systems and verifies that a trivial test program builds and runs.

OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=56
2013-07-02 16:36:04 +00:00
8c93addd58 - restore accidentally dropped suse-specific patches
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=55
2013-07-02 16:30:47 +00:00
Stephan Kulow
5e4d59ada8 Accepting request 181328 from Base:System
Update to upstream release 1.8.7, obsoleted patches. (forwarded request 181200 from stroeder)

OBS-URL: https://build.opensuse.org/request/show/181328
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=55
2013-06-29 12:51:55 +00:00
07a0c03b9a Accepting request 181200 from home:stroeder:branches:Base:System
Update to upstream release 1.8.7, obsoleted patches.

OBS-URL: https://build.opensuse.org/request/show/181200
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=53
2013-06-28 12:03:03 +00:00
Stephan Kulow
04df74a6bc Accepting request 156978 from Base:System
- added two security fixes:
  * CVE-2013-1775 (bnc#806919)
    + sudo-1.8.6p3-CVE-2013-1775.patch
  * CVE-2013-1776 (bnc#806921)
    + sudo-1.8.6p3-CVE-2013-1776.patch (forwarded request 156969 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/156978
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=54
2013-03-01 19:45:08 +00:00
Vítězslav Čížek
c942c5ab82 Accepting request 156969 from home:vitezslav_cizek:branches:Base:System
- added two security fixes:
  * CVE-2013-1775 (bnc#806919)
    + sudo-1.8.6p3-CVE-2013-1775.patch
  * CVE-2013-1776 (bnc#806921)
    + sudo-1.8.6p3-CVE-2013-1776.patch

OBS-URL: https://build.opensuse.org/request/show/156969
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=51
2013-03-01 12:07:40 +00:00
Ismail Dönmez
65a75b053a Accepting request 143956 from Base:System
license update: ISC
Look at the license file (forwarded request 143855 from babelworx)

OBS-URL: https://build.opensuse.org/request/show/143956
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=52
2012-12-05 13:09:24 +00:00
f3304123f3 Accepting request 143855 from home:babelworx:ldig:branches:Base:System
license update: ISC
Look at the license file

OBS-URL: https://build.opensuse.org/request/show/143855
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=49
2012-12-03 14:39:41 +00:00
Stephan Kulow
535addf130 Accepting request 140161 from Base:System
- sudo 1.8.6p3
* Support for using the System Security Services Daemon (SSSD) as a source of sudoers data
* Fixed a race condition that could cause sudo to receive SIGTTOU (and stop) 
  when resuming a shell that was run via sudo when I/O logging (and use_pty) is not enabled. 
* The sudoers plugin now takes advantage of symbol visibility controls when supported by the compiler or linker.
* Sending SIGTSTP directly to the sudo process will now suspend 
   the running command when I/O logging (and use_pty) is not enabled. (forwarded request 140141 from elvigia)

OBS-URL: https://build.opensuse.org/request/show/140161
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=51
2012-11-05 14:03:05 +00:00
60747c3aa2 Accepting request 140141 from home:elvigia:branches:Base:System
- sudo 1.8.6p3
* Support for using the System Security Services Daemon (SSSD) as a source of sudoers data
* Fixed a race condition that could cause sudo to receive SIGTTOU (and stop) 
  when resuming a shell that was run via sudo when I/O logging (and use_pty) is not enabled. 
* The sudoers plugin now takes advantage of symbol visibility controls when supported by the compiler or linker.
* Sending SIGTSTP directly to the sudo process will now suspend 
   the running command when I/O logging (and use_pty) is not enabled.

OBS-URL: https://build.opensuse.org/request/show/140141
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=47
2012-11-05 08:15:29 +00:00
Stephan Kulow
d235511496 Accepting request 139473 from Base:System
- add explicit buildrequire on groff (forwarded request 139469 from coolo)

OBS-URL: https://build.opensuse.org/request/show/139473
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=50
2012-10-27 05:48:07 +00:00
Cristian Rodríguez
76896bfa49 Accepting request 139469 from home:coolo:branches:openSUSE:Factory
- add explicit buildrequire on groff

OBS-URL: https://build.opensuse.org/request/show/139469
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=45
2012-10-26 15:57:42 +00:00
Stephan Kulow
9cef9b95fb Accepting request 124895 from Base:System
Update to 1.8.5p2; we want this as it includes important fixes (forwarded request 124880 from vuntz)

OBS-URL: https://build.opensuse.org/request/show/124895
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=48
2012-06-18 15:35:22 +00:00
Robert Milasan
5dc96be976 Accepting request 124880 from home:vuntz:branches:Base:System
Update to 1.8.5p2; we want this as it includes important fixes

OBS-URL: https://build.opensuse.org/request/show/124880
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=43
2012-06-14 07:37:32 +00:00
Stephan Kulow
7caf0515eb Accepting request 121250 from Base:System
- update to 1.8.5
  Some of the changes:
  * /etc/environment is no longer read directly on Linux systems when
    PAM is used. Sudo now merges the PAM environment into the user's
    environment which is typically set by the pam_env module.
  * The plugin API has been extended
  * The policy plugin's init_session function is now called by the
    parent sudo process, not the child process that executes the command
    This allows the PAM session to be open and closed in the same process,
    which some PAM modules require.
  * A new group provider plugin, system_group, is included
  * Fixed a potential security issue in the matching of hosts against
    an IPv4 network specified in sudoers.The flaw may allow a user who
    is authorized to run commands on hosts belonging to one IPv4
    network to run commands on a different host (CVE-2012-2337) (forwarded request 121223 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/121250
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=47
2012-05-21 06:02:12 +00:00
5b4fbad316 Accepting request 121223 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.5
  Some of the changes:
  * /etc/environment is no longer read directly on Linux systems when
    PAM is used. Sudo now merges the PAM environment into the user's
    environment which is typically set by the pam_env module.
  * The plugin API has been extended
  * The policy plugin's init_session function is now called by the
    parent sudo process, not the child process that executes the command
    This allows the PAM session to be open and closed in the same process,
    which some PAM modules require.
  * A new group provider plugin, system_group, is included
  * Fixed a potential security issue in the matching of hosts against
    an IPv4 network specified in sudoers.The flaw may allow a user who
    is authorized to run commands on hosts belonging to one IPv4
    network to run commands on a different host (CVE-2012-2337)

OBS-URL: https://build.opensuse.org/request/show/121223
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=41
2012-05-16 21:13:33 +00:00
Stephan Kulow
8bde0fcc0b Accepting request 108650 from Base:System
- update to 1.8.4p2
  Some of the changes:
  * The -D flag in sudo has been replaced with a more general
    debugging framework that is configured in sudo.conf.
  * Fixed a crash with sudo -i when a runas group was specified
    without a runas user.
  * New Serbian and Spanish translations for sudo from translationproject.org.
    LDAP-based sudoers may now access by group ID in addition to group name.
  * visudo will now fix the mode on the sudoers file even if no
    changes are made unless the -f option is specified.
  * On systems that use login.conf, sudo -i now sets environment
    variables based on login.conf
  * values in the LDAP search expression are now escaped as per RFC 4515
  * The deprecated "noexec_file" sudoers option is no longer supported.
  * Fixed a race condition when I/O logging is not enabled that could
    result in tty-generated signals (e.g. control-C) being received
    by the command twice.
  * visudo -c will now list any include files that were checked in
    addition to the main sudoers file when everything parses OK.
  * Users that only have read-only access to the sudoers file may
    now run visudo -c. Previously, write permissions were required
    even though no writing is down in check-only mode.

OBS-URL: https://build.opensuse.org/request/show/108650
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=46
2012-03-09 20:28:11 +00:00
Vítězslav Čížek
8dd91c7580 Accepting request 108646 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.4p2
  Some of the changes:
  * The -D flag in sudo has been replaced with a more general
    debugging framework that is configured in sudo.conf.
  * Fixed a crash with sudo -i when a runas group was specified
    without a runas user.
  * New Serbian and Spanish translations for sudo from translationproject.org.
    LDAP-based sudoers may now access by group ID in addition to group name.
  * visudo will now fix the mode on the sudoers file even if no
    changes are made unless the -f option is specified.
  * On systems that use login.conf, sudo -i now sets environment
    variables based on login.conf
  * values in the LDAP search expression are now escaped as per RFC 4515
  * The deprecated "noexec_file" sudoers option is no longer supported.
  * Fixed a race condition when I/O logging is not enabled that could
    result in tty-generated signals (e.g. control-C) being received
    by the command twice.
  * visudo -c will now list any include files that were checked in
    addition to the main sudoers file when everything parses OK.
  * Users that only have read-only access to the sudoers file may
    now run visudo -c. Previously, write permissions were required
    even though no writing is down in check-only mode.

OBS-URL: https://build.opensuse.org/request/show/108646
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=39
2012-03-09 15:02:22 +00:00
Stephan Kulow
9e2f1dc794 Accepting request 102196 from Base:System
- update to 1.8.3p2
  * Fixed a format string vulnerability when the sudo binary
    (or a symbolic link to the sudo binary) contains printf
    format escapes and the -D (debugging) flag is used.

OBS-URL: https://build.opensuse.org/request/show/102196
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=45
2012-02-01 12:17:30 +00:00
Vítězslav Čížek
a4db0dcc17 Accepting request 102195 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.3p2
  * Fixed a format string vulnerability when the sudo binary
    (or a symbolic link to the sudo binary) contains printf
    format escapes and the -D (debugging) flag is used.

OBS-URL: https://build.opensuse.org/request/show/102195
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=37
2012-01-31 12:34:31 +00:00
Stephan Kulow
2b7a499855 Accepting request 101544 from Base:System
- honour global CFLAGS and LDFLAGS when compiling sesh,
  to avoid rpmlint error (bnc#743157) (forwarded request 101520 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/101544
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=44
2012-01-26 15:00:37 +00:00
Cristian Rodríguez
dc65d7161e Accepting request 101520 from home:vitezslav_cizek:branches:Base:System
- honour global CFLAGS and LDFLAGS when compiling sesh,
  to avoid rpmlint error (bnc#743157)

OBS-URL: https://build.opensuse.org/request/show/101520
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=34
2012-01-25 17:06:41 +00:00
Vítězslav Čížek
f3f2cd6ff6 Accepting request 98778 from home:vitezslav_cizek:branches:Base:System
- update to sudo-1.8.3p1 
  * Fixed a crash in the monitor process on Solaris when NOPASSWD
    was specified or when authentication was disabled.
  * Fixed matching of a Runas_Alias in the group section of a Runas_Spec.

OBS-URL: https://build.opensuse.org/request/show/98778
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=33
2012-01-04 17:06:35 +00:00
Stephan Kulow
defc984e51 Accepting request 98380 from Base:System
Set timedir correctly (forwarded request 98341 from a_jaeger)

OBS-URL: https://build.opensuse.org/request/show/98380
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=43
2011-12-31 16:20:23 +00:00
Cristian Rodríguez
7a585a77e0 Accepting request 98341 from home:a_jaeger:FactoryFix
Set timedir correctly

OBS-URL: https://build.opensuse.org/request/show/98341
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=31
2011-12-28 19:07:41 +00:00
Stephan Kulow
89ae018d7d replace license with spdx.org variant
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=42
2011-12-06 18:06:13 +00:00
OBS User buildservice-autocommit
8f7438464a Updating link to change in openSUSE:Factory/sudo revision 42.0
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=2fa981306c6e78f09986e35850ef107a
2011-12-06 18:06:13 +00:00
Stephan Kulow
ebf9822650 Accepting request 89911 from Base:System
- update to sudo-1.8.3
  - Fixed expansion of strftime() escape sequences
    in the log_dir sudoers setting.
  - Esperanto, Italian and Japanese
    translations from translationproject.org.
  - Added --enable-werror configure option for gcc's
  -Werror flag.  - Visudo no longer
    assumes all editors support the +linenumber command line argument.
    It now uses a whitelist of editors known to support the option.
  - Fixed matching of network addresses when a netmask is specified but
    the address is not the first one in the CIDR block.
  - The configure script now check whether or not errno.h declares the
    errno variable. Previously, sudo would always declare errno itself
    for older systems that don't declare it in errno.h.
  - The NOPASSWD tag is now honored for denied commands too,
    which matches historic sudo behavior (prior to sudo 1.7.0).
  - Sudo now honors the DEREF
    setting in ldap.conf which controls how alias dereferencing is done
    during an LDAP search.
  - A symbol conflict with the
    pam_ssh_agent_auth PAM module that would cause a crash been
    resolved.
  - The inability to load a group provider plugin is no
    longer a fatal error.
  - A potential crash in the utmp handling
    code has been fixed.
  - Two PAM session issues have been resolved.
    In previous versions of sudo, the PAM session was opened as one
    user and closed as another. Additionally, if no authentication was
    performed, the PAM session would never be closed.

OBS-URL: https://build.opensuse.org/request/show/89911
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=41
2011-11-02 11:18:43 +00:00