SHA256
1
0
forked from pool/sudo

294 Commits

Author SHA256 Message Date
0b44b5e607 Accepting request 1304809 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1304809
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=155
2025-09-16 16:18:00 +00:00
cbecaf6b9a - Update to 1.9.17p2
* Fixed a bug introduced in sudo 1.9.16 that could result in sudo 
    sending SIGHUP to all processes on the system in certain rare
    cases. The bug could manifest if sudo is running a command in
    a pseudo-terminal, sudo terminates the command due to an
    internal error, and the user’s terminal is revoked. GitHub
    issue #458.
  * Fixed a bug introduced in sudo 1.9.12 that caused sudo to
    abort when the intercept and intercept_verify options are
    enabled in sudoers and either the command line arguments or
    the environment contains a string larger than the page size
    (usually 4096). This only Linux affects systems that support
    the ptrace_readv_string() function. GitHub issue #453.
  * Fixed a bug in sudo’s configure script introduced in sudo
    1.9.17 that prevented mdoc-format man pages from being used 
    on systems without the mandoc utility. Bug #1077.
- /usr/etc/sudoers and file /usr/etc/sudoers.d/50-wheel-auth-self
  both have permissions 0644, while visudo -c complains that they
  should be 0440. (bsc#1249447)
- Policy and Groups subpackages can be noarch

OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=260
2025-09-15 11:52:17 +00:00
265d8d856f Accepting request 1289367 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1289367
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=154
2025-07-02 10:07:22 +00:00
391a744635 - Update to 1.9.17p1
* Fix a possible local privilege escalation via the --host option
    [bsc#1245274, CVE-2025-32462]
  * Fix a possible local privilege Escalation via chroot option
    [bsc#1245275, CVE-2025-32463]
- Update to 1.9.17
  * Sudo now uses the NODEV macro consistently. Bug #1074.
    Fixed a bug where the ALL command in a sudoers rule would 
    override a previous NOSETENV tag. Command tags are inherited from
    previous Cmnds in a Cmnd_Spec_List. There is a special case for 
    the SETENV tag with the ALL command, where SETENV is implied if
    no explicit SETENV or NOSETENV tag is specified. This special 
    case did not take into account that a NOSETENV tag that was inherited 
    should override this behavior.
  * If sudo is run via ssh without a terminal and a password is required,
    it now suggest using ssh’s -t option.
  * Fixed the display of timeout values in the sudo -V output on systems
    without a C99-compliant snprintf() function.
  * Quieted a number of minor Coverity warnings.
  * Fixed a problem running sudo from a serial console on Linux when the
    command is run in a pseudo-terminal (the default).
  * Fixed a crash in sudo which could occur if there was a fatal error
    after the user was validated but before the command was actually run.
  * Fixed a number of man page style warnings. The “lint” make target in
    the docs directory will now run groff with warnings enabled if it is
    available. Bug #1075.
  * The ignore_dot sudoers setting is now on by default. There is now a
    --disable-ignore-dot configure option to disable it. The 
    --with-ignore-dot configure option has been deprecated.
  * Fixed a problem with the pwfeedback option where an initial backspace
    would reduce the maximum length allowed for the password. 
    GitHub issue #439.
  * Fixed minor grammar and spelling problems in the man pages.
  * Fixed a bug where a user could avoid entering a password for sudo -l
    command if they specified their own user or group name via the -u or
    -g options.
  * Avoid potential password guessing based on timing attacks on the 
    strcmp() function on systems without PAM or a crypt() function where
    plaintext passwords are stored in the shadow password file.
  * Fixed a potential information leak where sudo -l command could be used
    to determine whether an executable exists in a directory that they do
    not have search access to.
  * Sudo uses TCSAFLUSH, not TCSADRAIN, when disabling echo once again.
    A long time ago sudo changed from using TCSAFLUSH to TCSADRAIN due
    to some systems having bugs related to TCSAFLUSH. That should no longer
    be a concern. Using TCSAFLUSH ensures that password input that has been
    received by the kernel, but not yet read by sudo, will be discarded and
    not echoed.
  * Added the SUDO_TTY environment variable if the user has a terminal. 
    This can be used to find the user’s original tty device when sudo runs
    the command in its own pseudo-terminal. GitHub issue #447.
  * New Cantonese translation for sudo.

OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=258
2025-06-30 20:28:18 +00:00
45a44cbd7d Accepting request 1269784 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1269784
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=153
2025-04-16 18:38:12 +00:00
ee53581ddb - Update to 1.9.16p2:
* Sudo now passes the terminal device number to the policy plugin 
  even if it cannot resolve it to a path name. This allows sudo to
  run without warnings in a chroot jail when the terminal device
  files are not present. GitHub issue #421.
* On Linux systems, sudo will now attempt to use the symbolic links
  in /proc/self/fd/{0,1,2} when resolving the terminal device number.
  This can allow sudo to map a terminal device to its path name even
  when /dev/pts is not mounted in a chroot jail.
* Fixed compilation errors with gcc and clang in C23 mode. C23 no
  longer supports functions with unspecified arguments. GitHub issue
  #420.
* Fixed the test for cross-compiling when checking for C99 snprintf().
  The changes made to the test in sudo 1.9.16 resulted in a different
  problem. GitHub issue #386.
* Fixed the date used by the exit record in sudo-format log files.
  This was a regression introduced in sudo 1.9.16 and only affected
  file-based logs, not syslog. GitHub issue #405.
* Fixed the root cause of the “unable to find terminal name for device”
  message when running sudo on AIX when no terminal is present. In
  sudo 1.9.16 this was turned from a debug message into a warning. 
  GitHub issue #408.
* When a duplicate alias is found in the sudoers file, the warning
  message now includes the file and line number of the previous
  definition.
* Added support for the --with-secure-path-value=no configure option
  to allow packagers to ship the default sudoers file with the secure
  path line commented out.
* Sudo no longer sends mail when a user runs sudo -nv or sudo -nl,
  even if mail_badpass or mail_always are set. Sudo already avoids
  logging to a file or syslog in this case. Bug #1072.
* Added the cmddenial_message sudoers option to provide additional
  information to the user when a command is denied by the sudoers
  policy. The default message is still displayed.
* The time stamp used for file-based logs is now more consistent
  with the time stamp produced by syslog. GitHub issue #327.
* Sudo will now warn the user if it can detect the user’s terminal but
  cannot determine the path to the terminal device. The sudoers time 
  stamp file will now use the terminal device number directly. 
  GitHub issue #329.
* The embedded copy of zlib has been updated to version 1.3.1.
* Improved error handling if generating the list of signals and signal
  names fails at build time.
* Fixed a compilation issue on Linux systems without process_vm_readv().
* Fixed cross-compilation with WolfSSL.
* Added a json_compact value for the sudoers log_format option which can
  be used when logging to a file. The existing json value has been aliased
  to json_pretty. In a future release, json will be an alias for 
  json_compact. GitHub issue #357.
* A new pam_silent sudoers option has been added which may be negated to
  avoid suppressing output from PAM authentication modules. GitHub issue #216.
* Fixed several cvtsudoers JSON output problems. GitHub issues #369, #370, 
  #371, #373, #381.
* When sudo runs a command in a pseudo-terminal and the user’s terminal is
  revoked, the pseudo-terminal’s foreground process group will now receive
  SIGHUP before the terminal is revoked. This emulates the behavior of the
  session leader exiting and is consistent with what happens when,
  for example, an ssh session is closed. GitHub issue #367.
* Fixed make test with Python 3.12. GitHub issue #374.
* In schema.ActiveDirectory, fixed the quoting in the example command. 
  GitHub issue #376.
* Paths specified via a Chdir_Spec or Chroot_Spec in sudoers may now
  be double-quoted.
* Sudo insults are now included by default, but disabled unless the
  --with-insults configure option is specified or the insults sudoers
  option is enabled.
* The default sudoers file now enables the secure_path option by
  default and preserves the EDITOR, VISUAL, and SUDO_EDITOR environment
  variables when running visudo. The new --with-secure-path-value
  configure option can be used to set the value of secure_path in
  the default sudoers file. GitHub issue #387.
* A sudoers schema for IBM Directory Server (aka IBM Tivoli Directory
  Server, IBM Security Directory Server, and IBM Security Verify
  Directory) is now included.
* When cross-compiling sudo, the configure script now assumes that
  the snprintf() function is C99-compliant if the C compiler 
  supports the C99 standard. Previously, configure would use sudo’s 
  own snprintf() when cross-compiling. GitHub issue #386.

OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=256
2025-04-16 07:35:23 +00:00
bb1f9df8d0 Accepting request 1191650 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1191650
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=152
2024-08-05 15:21:27 +00:00
5972673ac8 Accepting request 1136065 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1136065
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=151
2024-01-03 11:23:00 +00:00
Otto Hollmann
70fb575b0f Accepting request 1136064 from home:ohollmann:branches:Base:System
- Update to 1.9.15p5:
  * Fixed evaluation of the lecture, listpw, verifypw, and fdexec sudoers
    Defaults settings when used without an explicit value. Previously, if
    specified without a value they were evaluated as boolean false, even when
    the negation operator ('!') was not present.
  * Fixed a bug introduced in sudo 1.9.14 that prevented LDAP netgroup queries
    using the NETGROUP_BASE setting from being performed.
  * Sudo will now transparently rename a user's lecture file from the older
    name-based path to the newer user-ID-based path. GitHub issue #342.
  * Fixed a bug introduced in sudo 1.9.15 that could cause a memory allocation
    failure if sysconf(_SC_LOGIN_NAME_MAX) fails. Bug #1066.

OBS-URL: https://build.opensuse.org/request/show/1136064
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=251
2024-01-02 07:33:29 +00:00
b73b192ac9 Accepting request 1134040 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1134040
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=150
2023-12-20 20:01:05 +00:00
Otto Hollmann
1c938f4d97 Accepting request 1134033 from home:ohollmann:branches:Base:System
- For existing products (SLE15-SP* and older) keep using /etc and don't
  switch to /usr/etc. So only SLES16/ALP, Tumbleweed and newer products
  will use both /etc and /usr/etc locations.

- Update to 1.9.15p4:
  * Fixed a bug introduced in sudo 1.9.15 that could prevent a user’s
    privileges from being listed by sudo -l if the sudoers entry
    in /etc/nsswitch.conf contains [SUCCESS=return]. This did not affect the
    ability to run commands via sudo. Bug #1063.
- Update to 1.9.15p3:
  * Always disable core dumps when sudo sends itself a fatal signal. Fixes a
    problem where sudo could potentially dump core dump when it re-sends the
    fatal signal to itself. This is only an issue if the command   * received
    a signal that would normally result in a core dump but the command did
    not actually dump core.
  * Fixed a bug matching a command with a relative path name when the sudoers
    rule uses shell globbing rules for the path name. Bug #1062.
  * Permit visudo to be run even if the local host name is not set. GitHub
    issue #332.
  * Fixed an editing error introduced in sudo 1.9.15 that could prevent
    sudoreplay from replaying sessions correctly. GitHub issue #334.
  * Fixed a bug introduced in sudo 1.9.15 where sudo -l > /dev/null could hang
    on Linux systems. GitHub issue #335.
  * Fixed a bug introduced in sudo 1.9.15 where Solaris privileges specified
    in sudoers were not applied to the command being run.

OBS-URL: https://build.opensuse.org/request/show/1134033
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=249
2023-12-19 13:45:01 +00:00
fec9486da2 Accepting request 1128361 from Base:System
- Update to 1.9.15p2:
  * Fixed a bug on BSD systems where sudo would not restore the
    terminal settings on exit if the terminal had parity enabled.
    GitHub issue #326.
- Update to 1.9.15p1:
  * Fixed a bug introduced in sudo 1.9.15 that prevented LDAP-based
    sudoers from being able to read the ldap.conf file.
    GitHub issue #325.
- Update to 1.9.15:
  * Fixed an undefined symbol problem on older versions of macOS
    when "intercept" or "log_subcmds" are enabled in sudoers.
    GitHub issue #276.
  * Fixed "make check" failure related to getpwent(3) wrapping
    on NetBSD.
  * Fixed the warning message for "sudo -l command" when the command
    is not permitted.  There was a missing space between "list" and
    the actual command due to changes in sudo 1.9.14.
  * Fixed a bug where output could go to the wrong terminal if
    "use_pty" is enabled (the default) and the standard input, output
    or error is redirected to a different terminal.  Bug #1056.
  * The visudo utility will no longer create an empty file when the
    specified sudoers file does not exist and the user exits the
    editor without making any changes.  GitHub issue #294.
  * The AIX and Solaris sudo packages on www.sudo.ws now support
    "log_subcmds" and "intercept" with both 32-bit and 64-bit
    binaries.  Previously, they only worked when running binaries
    with the same word size as the sudo binary.  GitHub issue #289.
  * The sudoers source is now logged in the JSON event log.  This
    makes it possible to tell which rule resulted in a match.
  * Running "sudo -ll command" now produces verbose output that

OBS-URL: https://build.opensuse.org/request/show/1128361
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=149
2023-12-05 16:02:24 +00:00
Otto Hollmann
01793c9cfc Accepting request 1128140 from home:ohollmann:branches:Base:System
- Update to 1.9.15p2:
  * Fixed a bug on BSD systems where sudo would not restore the
    terminal settings on exit if the terminal had parity enabled.
    GitHub issue #326.
- Update to 1.9.15p1:
  * Fixed a bug introduced in sudo 1.9.15 that prevented LDAP-based
    sudoers from being able to read the ldap.conf file.
    GitHub issue #325.
- Update to 1.9.15:
  * Fixed an undefined symbol problem on older versions of macOS
    when "intercept" or "log_subcmds" are enabled in sudoers.
    GitHub issue #276.
  * Fixed "make check" failure related to getpwent(3) wrapping
    on NetBSD.
  * Fixed the warning message for "sudo -l command" when the command
    is not permitted.  There was a missing space between "list" and
    the actual command due to changes in sudo 1.9.14.
  * Fixed a bug where output could go to the wrong terminal if
    "use_pty" is enabled (the default) and the standard input, output
    or error is redirected to a different terminal.  Bug #1056.
  * The visudo utility will no longer create an empty file when the
    specified sudoers file does not exist and the user exits the
    editor without making any changes.  GitHub issue #294.
  * The AIX and Solaris sudo packages on www.sudo.ws now support
    "log_subcmds" and "intercept" with both 32-bit and 64-bit
    binaries.  Previously, they only worked when running binaries
    with the same word size as the sudo binary.  GitHub issue #289.
  * The sudoers source is now logged in the JSON event log.  This
    makes it possible to tell which rule resulted in a match.
  * Running "sudo -ll command" now produces verbose output that

OBS-URL: https://build.opensuse.org/request/show/1128140
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=247
2023-11-23 07:21:18 +00:00
Otto Hollmann
27c0857d41 Accepting request 1127862 from home:dimstar:Factory
- Package/ship empty /etc/sudoers.d directory for admins to
  discover where to put their won config.

OBS-URL: https://build.opensuse.org/request/show/1127862
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=246
2023-11-21 11:38:24 +00:00
Otto Hollmann
535b070a67 Accepting request 1114961 from home:ohollmann:branches:Remove-targetpw
- Introduce optional wheel and sudo group policies as separate packages
  (bsc#1203978, jsc#PED-260)

- Install config files into /usr/etc and read from both location:
  /etc and /usr/etc (bsc#1205118)

OBS-URL: https://build.opensuse.org/request/show/1114961
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=245
2023-10-03 12:11:35 +00:00
50ba86bda0 Accepting request 1110628 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1110628
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=148
2023-09-13 18:43:27 +00:00
Otto Hollmann
a1f80d7634 Accepting request 1110618 from home:ohollmann:branches:Base:System
- Update to 1.9.14p3:
  * Fixed a crash with Python 3.12 when the sudo Python python is unloaded.
    This only affects make check for the Python plugin.
  * Adapted the sudo Python plugin test output to match Python 3.12.
- Update to 1.9.14p2:
  * Fixed a crash on Linux systems introduced in version 1.9.14 when running a
    command with a NULL argv[0] if log_subcmds or intercept is enabled in
    sudoers.
  * Fixed a problem with "stair-stepped" output when piping or redirecting the
    output of a sudo command that takes user input when running a command in
    a pseudo-terminal.
  * Fixed a bug introduced in sudo 1.9.14 that affects matching sudoers rules
    containing a Runas_Spec with an empty Runas user. These rules should only
    match when sudo’s -g option is used but were matching even without the -g
    option. #290.

OBS-URL: https://build.opensuse.org/request/show/1110618
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=243
2023-09-12 13:46:37 +00:00
eb88b88e35 Accepting request 1100258 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1100258
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=147
2023-07-25 09:22:45 +00:00
Otto Hollmann
c10ea702eb Accepting request 1098344 from home:polslinux:branches:Base:System
- Update to 1.9.14p1:
  * Fixed an invalid free bug in sudo_logsrvd that was introduced
    in version 1.9.14 which could cause sudo_logsrvd to crash.
  * The sudoers plugin no longer tries to send the terminal name
    to the log server when no terminal is present.  This bug was
    introduced in version 1.9.14.
  * Fixed a bug where if the "intercept" or "log_subcmds" sudoers
    option was enabled and a sub-command was run where the first
    entry of the argument vector didn't match the command being run.
    This resulted in commands like "sudo su -" being killed due to
    the mismatch.  Bug #1050.
  * The sudoers plugin now canonicalizes command path names before
    matching (where possible).  This fixes a bug where sudo could
    execute the wrong path if there are multiple symbolic links with
    the same target and the same base name in sudoers that a user is
    allowed to run.  GitHub issue #228.
  * Improved command matching when a chroot is specified in sudoers.
    The sudoers plugin will now change the root directory id needed
    before performing command matching.  Previously, the root directory
    was simply prepended to the path that was being processed.
  * When NETGROUP_BASE is set in the ldap.conf file, sudo will now
    perform its own netgroup lookups of the host name instead of
    using the system innetgr(3) function.  This guarantees that user
    and host netgroup lookups are performed using  the same LDAP
    server (or servers).
  * Fixed a bug introduced in sudo 1.9.13 that resulted in a missing
    " ; " separator between environment variables and the command
    in log entries.
  * The visudo utility now displays a warning when it ignores a file
    in an include dir such as /etc/sudoers.d.

OBS-URL: https://build.opensuse.org/request/show/1098344
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=241
2023-07-24 07:33:45 +00:00
b541b516a5 Accepting request 1077888 from Base:System
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1077888
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=146
2023-04-08 15:39:06 +00:00
Otto Hollmann
dd0ccf68c1 Accepting request 1077512 from home:mkoutny:pam-nl
- sudo.pamd: Use common-session-nonlogin for >15 codestreams
  More info in https://github.com/SUSE/pam-config/pull/16

OBS-URL: https://build.opensuse.org/request/show/1077512
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=239
2023-04-06 13:54:53 +00:00
4bf965eda4 Accepting request 1072565 from Base:System
- Update to 1.9.13p2 (bsc#1208595, CVE-2023-27320):
    This bug was introduced in sudo 1.9.8.

OBS-URL: https://build.opensuse.org/request/show/1072565
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=145
2023-03-17 16:01:33 +00:00
f00f1f5870 - Update to 1.9.13p2 (bsc#1208595, CVE-2023-27320):
This bug was introduced in sudo 1.9.8.

OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=237
2023-03-17 10:11:22 +00:00
50cac93b2c Accepting request 1070288 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1070288
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=144
2023-03-11 17:22:09 +00:00
Jason Sikes
67b4f8099e Accepting request 1070277 from home:jsikes:branches:Base:System
Update to 1.9.13p3! Enjoy.

OBS-URL: https://build.opensuse.org/request/show/1070277
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=235
2023-03-09 02:49:46 +00:00
7c9537165f Accepting request 1068081 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1068081
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=143
2023-03-01 15:13:33 +00:00
Jason Sikes
ab630daf5c Accepting request 1068080 from home:jsikes:branches:Base:System
Update that fixes bsc1208595! Enjoy.

OBS-URL: https://build.opensuse.org/request/show/1068080
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=233
2023-02-28 01:47:49 +00:00
b5593e3f2c Accepting request 1067332 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1067332
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=142
2023-02-25 18:54:25 +00:00
Jason Sikes
23d15e05f3 Accepting request 1066577 from home:jsikes:branches:Base:System
Update to 1.9.13p1! Enjoy.

OBS-URL: https://build.opensuse.org/request/show/1066577
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=231
2023-02-23 08:56:52 +00:00
499550670b Accepting request 1066068 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1066068
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=141
2023-02-17 15:43:45 +00:00
Jason Sikes
bf67a396fd Accepting request 1065829 from home:jsikes:branches:Base:System
Update to 1.9.13! Enjoy.

OBS-URL: https://build.opensuse.org/request/show/1065829
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=229
2023-02-15 22:46:09 +00:00
a97ce1b655 Accepting request 1060308 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1060308
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=140
2023-01-24 18:41:58 +00:00
Jason Sikes
f0df0be3cd Accepting request 1060306 from home:jsikes:branches:Base:System
Fix that addresses bsc#1207082. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/1060306
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=227
2023-01-22 22:07:43 +00:00
688eb82737 Accepting request 1037191 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1037191
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=139
2022-11-23 08:47:30 +00:00
Jason Sikes
5e11511896 Accepting request 1037190 from home:jsikes:branches:Base:System
Update to sudo-1.9.12p1! Enjoy.

OBS-URL: https://build.opensuse.org/request/show/1037190
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=225
2022-11-21 22:44:26 +00:00
3af64af2bc Force re-apply fix for CVE-2022-43995
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=138
2022-11-07 08:26:04 +00:00
46d8b05655 https://bugzilla.suse.com/show_bug.cgi?id=1205094
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=137
2022-11-07 08:20:11 +00:00
e884624d21 Accepting request 1033644 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1033644
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=136
2022-11-05 13:46:47 +00:00
Jason Sikes
a4384d0471 Accepting request 1033421 from home:jsikes:branches:Base:System
Fix for CVE-2022-43995! Enjoy.

OBS-URL: https://build.opensuse.org/request/show/1033421
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=223
2022-11-05 01:36:10 +00:00
8250ad4c64 Accepting request 1032755 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1032755
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=135
2022-11-03 18:13:03 +00:00
Jason Sikes
829dc336b7 Accepting request 1032754 from home:jsikes:branches:Base:System
Changes for bsc#1203978 and PED-260! Enjoy.

OBS-URL: https://build.opensuse.org/request/show/1032754
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=221
2022-11-01 22:57:05 +00:00
8228a6cd9d Accepting request 1031418 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1031418
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=134
2022-10-28 17:28:55 +00:00
Jason Sikes
4fec79beac Accepting request 1031218 from home:jsikes:branches:Base:System
Update to 1.9.12! Enjoy.

OBS-URL: https://build.opensuse.org/request/show/1031218
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=219
2022-10-26 22:34:34 +00:00
30c10b12e5 Accepting request 1003396 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1003396
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=133
2022-09-15 20:57:37 +00:00
Jason Sikes
80565d39fb Accepting request 1002370 from home:jsikes:branches:Base:System
Fixed bsc#1177578. It's small. No, it's 'FUN-SIZED'! Enjoy!

OBS-URL: https://build.opensuse.org/request/show/1002370
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=217
2022-09-13 23:23:53 +00:00
277f190914 Accepting request 998921 from Base:System
OBS-URL: https://build.opensuse.org/request/show/998921
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=132
2022-08-25 13:32:59 +00:00
Jason Sikes
1b78263838 Accepting request 998277 from home:jsikes:branches:Base:System
Updated. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/998277
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=215
2022-08-23 23:14:55 +00:00
5e7d5fb7c8 Accepting request 998274 from Base:System
OBS-URL: https://build.opensuse.org/request/show/998274
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=131
2022-08-22 09:04:54 +00:00
Jason Sikes
211bbb80cf Accepting request 993732 from home:kukuk:branches:Base:System
- Use %_pam_vendordir macro
- Fix errors around LICENSE.md (fixes building on SLE12 SP5 again)

OBS-URL: https://build.opensuse.org/request/show/993732
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=213
2022-08-20 00:48:17 +00:00
db4576c51e Accepting request 964748 from Base:System
OBS-URL: https://build.opensuse.org/request/show/964748
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=130
2022-03-28 14:58:48 +00:00
Jason Sikes
188f5779d8 Accepting request 964503 from home:dirkmueller:Factory
- update to 1.9.10:
  * Added new log_passwords and passprompt_regex sudoers options. If
    log_passwords is disabled, sudo will attempt to prevent passwords from being
    logged. If sudo detects any of the regular expressions in the passprompt_regex
    list in the terminal output, sudo will log ‘*’ characters instead of the
    terminal input until a newline or carriage return is found in the input or an
    output character is received.
  * Added new log_passwords and passprompt_regex settings to sudo_logsrvd that
    operate like the sudoers options when logging terminal input.
  * Fixed several few bugs in the cvtsudoers utility when merging multiple sudoers
    sources.
  * Fixed a bug in sudo_logsrvd parsing the sudo_logsrvd.conf file, where the
    retry_interval in the [relay] section was not being recognized.
  * Restored the pre-1.9.9 behavior of not performing authentication when sudo’s -n
    option is specified. A new noninteractive_auth sudoers option has been added to
    enable PAM authentication in non-interactive mode. GitHub issue #131.
  * On systems with /proc, if the /proc/self/stat (Linux) or /proc/pid/psinfo
    (other systems) file is missing or invalid, sudo will now check file
    descriptors 0-2 to determine the user’s terminal. Bug #1020.
  * Fixed a compilation problem on Debian kFreeBSD. Bug #1021.
  * Fixed a crash in sudo_logsrvd when running in relay mode if an alert message is
    received.
  * Fixed an issue that resulting in “problem with defaults entries” email to be
    sent if a user ran sudo when the sudoers entry in the nsswitch.conf file
    includes “sss” but no sudo provider is configured in /etc/sssd/sssd.conf.
  * Updated the warning displayed when the invoking user is not allowed to run
    sudo. If sudo has been configured to send mail on failed attempts (see the
    mail_* flags in sudoers), it will now print “This incident has been reported to
    the administrator.” If the mailto or mailerpath sudoers settings are disabled,
    the message will not be printed and no mail will be sent.

OBS-URL: https://build.opensuse.org/request/show/964503
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=211
2022-03-25 04:48:17 +00:00
b64795a9b2 Accepting request 959857 from Base:System
OBS-URL: https://build.opensuse.org/request/show/959857
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=129
2022-03-08 19:31:28 +00:00
c9aee8b1e3 Accepting request 959556 from home:jsikes:branches:Base:System
Fix for bsc 1193446. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/959556
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=209
2022-03-07 11:36:16 +00:00
eaece45fce Accepting request 955511 from Base:System
OBS-URL: https://build.opensuse.org/request/show/955511
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=128
2022-02-18 22:02:36 +00:00
Jason Sikes
86ffaf5f6b Accepting request 955502 from home:simotek:branches:Base:System
- Restrict use of sudo -U other -l to people who have permission
  to run commands as that user (bsc#1181703, jsc#SLE-22569)
  * feature-upstream-restrict-sudo-U-other-l.patch

OBS-URL: https://build.opensuse.org/request/show/955502
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=208
2022-02-17 01:40:01 +00:00
8f8097e0ab Accepting request 950730 from Base:System
OBS-URL: https://build.opensuse.org/request/show/950730
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=127
2022-02-03 22:15:48 +00:00
c1da9ded70 Accepting request 950728 from home:simotek:branches:Base:System
- Update to 1.9.9
   * Sudo can now be built with OpenSSL 3.0 without generating
     warnings about deprecated OpenSSL APIs.
   * A digest can now be specified along with the ALL command in
     the LDAP and SSSD back-ends. Sudo 1.9.0 introduced support for
     this in the sudoers file but did not include corresponding
     changes for the other back-ends.
   * visudo now only warns about an undefined alias or a cycle in
     an alias once for each alias.
   * The sudoRole cn was truncated by a single character in warning
     messages. GitHub issue #115.
   * The cvtsudoers utility has new --group-file and --passwd-file
     options to use a custom passwd or group file when the
     --match-local option is also used.
   * The cvtsudoers utility can now filter or match based on a command.
   * The cvtsudoers utility can now produce output in csv
     (comma-separated value) format. This can be used to help generate
     entitlement reports.
   * Fixed a bug in sudo_logsrvd that could result in the connection
     being dropped for very long command lines.
   * Fixed a bug where sudo_logsrvd would not accept a restore point
     of zero.
   * Fixed a bug in visudo where the value of the editor setting was
     not used if it did not match the user’s EDITOR environment
     variable. This was only a problem if the env_editor setting was
     not enabled. Bug #1000.
   * Sudo now builds with the -fcf-protection compiler option and the
     -z now linker option if supported.
   * The output of sudoreplay -l now more closely matches the
     traditional sudo log format.
   * The sudo_sendlog utility will now use the full contents of the
     log.json file, if present. This makes it possible to send
     sudo-format I/O logs that use the newer log.json format to
     sudo_logsrvd without losing any information.
   * Fixed compilation of the arc4random_buf() replacement on systems
     with arc4random() but no arc4random_buf(). Bug #1008.
   * Sudo now uses its own getentropy() by default on Linux. The GNU
     libc version of getentropy() will fail on older kernels that
     don’t support the getrandom() system call.
   * It is now possible to build sudo with WolfSSL’s OpenSSL
     compatibility layer by using the --enable-wolfssl configure
     option.
   * Fixed a bug related to Daylight Saving Time when parsing
     timestamps in Generalized Time format. This affected the NOTBEFORE
     and NOTAFTER options in sudoers. Bug #1006.
   * Added the -O and -P options to visudo, which can be used to check
     or set the owner and permissions. This can be used in conjunction
     with the -c option to check that the sudoers file ownership and
     permissions are correct. Bug #1007.
   * It is now possible to set resource limits in the sudoers file
     itself. The special values default and “user” refer to the
     default system limit and invoking user limit respectively. The
     core dump size limit is now set to 0 by default unless overridden
     by the sudoers file.
   * The cvtsudoers utility can now merge multiple sudoers sources into
     a single, combined sudoers file. If there are conflicting entries,
     cvtsudoers will attempt to resolve them but manual intervention
     may be required. The merging of sudoers rules is currently fairly
     simplistic but will be improved in a future release.
   * Sudo was parsing but not applying the “deref” and “tls_reqcert”
     ldap.conf settings. This meant the options were effectively ignored
     which broke dereferencing of aliases in LDAP. Bug #1013.
   * Clarified in the sudo man page that the security policy may
     override the user’s PATH environment variable. Bug #1014.
   * When sudo is run in non-interactive mode (with the -n option), it
     will now attempt PAM authentication and only exit with an error if
     user interaction is required. This allows PAM modules that don’t
     interact with the user to succeed. Previously, sudo would not
     attempt authentication if the -n option was specified. Bug #956
     and GitHub issue #83.
   * Fixed a regression introduced in version 1.9.1 when sudo is built
     with the --with-fqdn configure option. The local host name was
     being resolved before the sudoers file was processed, making it
     impossible to disable DNS lookups by negating the fqdn sudoers
     option. Bug #1016.
   * Added support for negated sudoUser attributes in the LDAP and SSSD
     sudoers back ends. A matching sudoUser that is negated will cause
     the sudoRole containing it to be ignored.
   * Fixed a bug where the stack resource limit could be set to a value
     smaller than that of the invoking user and not be reset before the
     command was run. Bug #1016.
- sudo no longer ships schema for LDAP.
- sudo-feature-negated-LDAP-users.patch dropped, included upstream
- refreshed sudo-sudoers.patch

OBS-URL: https://build.opensuse.org/request/show/950728
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=207
2022-02-02 12:27:10 +00:00
bb99464edf Accepting request 949359 from home:simotek:branches:Base:System
- Add support in the LDAP filter for negated users, patch taken
  from upstream (jsc#20068)
  * Adds sudo-feature-negated-LDAP-users.patch

OBS-URL: https://build.opensuse.org/request/show/949359
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=206
2022-01-31 08:20:47 +00:00
e1878025fc Accepting request 935849 from Base:System
- update to 1.9.8p2
  * Fixed a potential out-of-bounds read with "sudo -i" when the
    target user's shell is bash.  This is a regression introduced
    in sudo 1.9.8.  Bug #998.
  * sudo_logsrvd now only sends a log ID for first command of a session.
    There is no need to send the log ID for each sub-command.
  * Fixed a few minor memory leaks in intercept mode.
  * Fixed a problem with sudo_logsrvd in relay mode if "store_first"
    was enabled when handling sub-commands.  A new zero-length journal
    file was created for each sub-command instead of simply using
    the existing journal file.
- update to 1.9.8p1
  * Fixed support for passing a prompt (sudo -p) or a login class
    (sudo -l) on the command line.  This is a regression introduced
    in sudo 1.9.8.  Bug #993.
  * Fixed a crash with "sudo ALL" rules in the LDAP and SSSD back-ends.
    This is a regression introduced in sudo 1.9.8.  Bug #994.
  * Fixed a compilation error when the --enable-static-sudoers configure
    option was specified.  This is a regression introduced in sudo
    1.9.8 caused by a symbol clash with the intercept and log server
    protobuf functions.
  * It is now possible to transparently intercepting sub-commands
    executed by the original command run via sudo.  Intercept support
    is implemented using LD_PRELOAD (or the equivalent supported by
    the system) and so has some limitations.  The two main limitations
    are that only dynamic executables are supported and only the
    execl, execle, execlp, execv, execve, execvp, and execvpe library
    functions are currently intercepted. Its main use case is to
    support restricting privileged shells run via sudo.
    To support this, there is a new "intercept" Defaults setting and

OBS-URL: https://build.opensuse.org/request/show/935849
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=126
2021-12-08 21:08:26 +00:00
baf92a7f64 OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=205 2021-12-05 19:32:13 +00:00
Jason Sikes
274646d6dc Accepting request 920883 from home:kstreitova:sudo
- update to 1.9.8p2
  * Fixed a potential out-of-bounds read with "sudo -i" when the
    target user's shell is bash.  This is a regression introduced
    in sudo 1.9.8.  Bug #998.
  * sudo_logsrvd now only sends a log ID for first command of a session.
    There is no need to send the log ID for each sub-command.
  * Fixed a few minor memory leaks in intercept mode.
  * Fixed a problem with sudo_logsrvd in relay mode if "store_first"
    was enabled when handling sub-commands.  A new zero-length journal
    file was created for each sub-command instead of simply using
    the existing journal file.
- update to 1.9.8p1
  * Fixed support for passing a prompt (sudo -p) or a login class
    (sudo -l) on the command line.  This is a regression introduced
    in sudo 1.9.8.  Bug #993.
  * Fixed a crash with "sudo ALL" rules in the LDAP and SSSD back-ends.
    This is a regression introduced in sudo 1.9.8.  Bug #994.
  * Fixed a compilation error when the --enable-static-sudoers configure
    option was specified.  This is a regression introduced in sudo
    1.9.8 caused by a symbol clash with the intercept and log server
    protobuf functions.
  * It is now possible to transparently intercepting sub-commands
    executed by the original command run via sudo.  Intercept support
    is implemented using LD_PRELOAD (or the equivalent supported by
    the system) and so has some limitations.  The two main limitations
    are that only dynamic executables are supported and only the
    execl, execle, execlp, execv, execve, execvp, and execvpe library
    functions are currently intercepted. Its main use case is to
    support restricting privileged shells run via sudo.
    To support this, there is a new "intercept" Defaults setting and

OBS-URL: https://build.opensuse.org/request/show/920883
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=204
2021-09-22 14:50:58 +00:00
Jason Sikes
d4c80a2758 Accepting request 908959 from home:ykurlaev:branches:Base:System2
- Fix commented out "Defaults env_keep" in sudo-sudoers.patch

OBS-URL: https://build.opensuse.org/request/show/908959
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=203
2021-09-21 14:53:15 +00:00
Jason Sikes
8f39b9fd2e Accepting request 909589 from home:dirkmueller:Factory
- update to 1.9.7p2:
  * When formatting JSON output, octal numbers are now stored as strings, not
    numbers. The JSON spec does not actually support octal numbers with a 0
    prefix.
  * Sudo now can handle the getgroups() function returning a different number
    of groups for subsequent invocations. GitHub PR #106.
  * When loading a Python plugin, python_plugin.so now verifies that the module
    loaded matches the one we tried to load. This allows sudo to display a more
    useful error message when trying to load a plugin with a name that conflicts
    with a Python module installed in the system location.
  * Sudo no longer sets the the open files resource limit to unlimited while it
    runs. This avoids a problem where sudo's closefrom() emulation would need to
    close a very large number of descriptors on systems without a way to determine
    which ones are actually open.
  * Sudo now includes a configure check for va_copy or __va_copy and only defines
    its own version if the configure test fails.
  * Fixed a bug in sudo's utmp file handling which prevented old entries from being
    reused. As a result, the utmp (or utmpx) file was appended to unnecessarily.
  * ixed a bug introduced in sudo 1.9.7 that prevented sudo_logsrvd from
    accepting TLS connections when OpenSSL is used. Bug #988.
  * Fixed an SELinux sudoedit bug when the edited temporary file could not be
    opened. The sesh helper would still be run even when there are no temporary
    files available to install.
  * The sudo_noexec.so file is now built as a module on all systems other than
    macOS. This makes it possible to use other libtool implementations such as
    slibtool. On macOS shared libraries and modules are not interchangeable and
    the version of libtool shipped with sudo must be used.

OBS-URL: https://build.opensuse.org/request/show/909589
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=202
2021-09-21 14:50:01 +00:00
8175b656b8 Accepting request 912793 from Base:System
OBS-URL: https://build.opensuse.org/request/show/912793
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=125
2021-08-23 08:07:39 +00:00
Jason Sikes
6c83a9a46c Accepting request 909383 from home:czanik:branches:Base:System
- update to 1.9.7p2 
- enabled openssl support for secure central session
  recording collection (without it's clear text)
- fixed SLES12 build
 * When formatting JSON output, octal numbers are now stored as
   strings, not numbers.  The JSON spec does not actually support
   octal numbers with a '0' prefix.
 * Fixed a compilation issue on Solaris 9.
 * Sudo now can handle the getgroups() function returning a different
   number of groups for subsequent invocations.  GitHub PR #106.
 * When loading a Python plugin, python_plugin.so now verifies
   that the module loaded matches the one we tried to load.  This
   allows sudo to display a more useful error message when trying
   to load a plugin with a name that conflicts with a Python module
   installed in the system location.
 * Sudo no longer sets the the open files resource limit to "unlimited"
   while it runs.  This avoids a problem where sudo's closefrom()
   emulation would need to close a very large number of descriptors
   on systems without a way to determine which ones are actually open.
 * Sudo now includes a configure check for va_copy or __va_copy and
   only defines its own version if the configure test fails.
 * Fixed a bug in sudo's utmp file handling which prevented old
   entries from being reused.  As a result, the utmp (or utmpx)
   file was appended to unnecessarily.  GitHub PR #108.
 * Fixed a bug introduced in sudo 1.9.7 that prevented sudo_logsrvd
   from accepting TLS connections when OpenSSL is used.  Bug #988.
 * Fixed an SELinux sudoedit bug when the edited temporary file
   could not be opened.  The sesh helper would still be run even
   when there are no temporary files available to install.
 * Fixed a compilation problem on FreeBSD.
 * The sudo_noexec.so file is now built as a module on all systems
   other than macOS.  This makes it possible to use other libtool
   implementations such as slibtool.  On macOS shared libraries and
   modules are not interchangeable and the version of libtool shipped
   with sudo must be used.
 * Fixed a few bugs in the getgrouplist() emulation on Solaris when
   reading from the local group file.
 * Fixed a bug in sudo_logsrvd that prevented periodic relay server
   connection retries from occurring in "store_first" mode.
 * Disabled the nss_search()-based getgrouplist() emulation on HP-UX
   due to a crash when the group source is set to "compat" in
   /etc/nsswitch.conf.  This is probably due to a mismatch between
   include/compat/nss_dbdefs.h and what HP-UX uses internally.  On
   HP-UX we now just cycle through groups the slow way using
   getgrent().  Bug #978.

OBS-URL: https://build.opensuse.org/request/show/909383
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=201
2021-08-17 23:42:04 +00:00
d4c5802060 Accepting request 908922 from Base:System
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/908922
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=124
2021-08-02 10:04:50 +00:00
3a3c58c1c7 Accepting request 905883 from home:ykurlaev:branches:Base:System
Fix LC_TIME incorrectly named LC_ATIME

OBS-URL: https://build.opensuse.org/request/show/905883
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=200
2021-07-28 14:44:04 +00:00
fa6184d78b Accepting request 892573 from Base:System
- update to 1.9.7
  * The "fuzz" Makefile target now runs all the fuzzers for 8192
    passes (can be overridden via the FUZZ_RUNS variable).  This makes
    it easier to run the fuzzers in-tree.  To run a fuzzer indefinitely,
    set FUZZ_RUNS=-1, e.g. "make FUZZ_RUNS=-1 fuzz".
  * Fixed fuzzing on FreeBSD where the ld.lld linker returns an
    error by default when a symbol is multiply-defined.
  * Added support for determining local IPv6 addresses on systems
    that lack the getifaddrs() function.  This now works on AIX,
    HP-UX and Solaris (at least).  Bug #969.
  * Fixed a bug introduced in sudo 1.9.6 that caused "sudo -V" to
    report a usage error.  Also, when invoked as sudoedit, sudo now
    allows a more restricted set of options that matches the usage
    statement and documentation.  GitHub issue #95.
  * Fixed a crash in sudo_sendlog when the specified certificate
    or key does not exist or is invalid.  Bug #970
  * Fixed a compilation error when sudo is configured with the
    --disable-log-client option.
  * Sudo's limited support for SUCCESS=return entries in nsswitch.conf
    is now documented.  Bug #971.
  * Sudo now requires autoconf 2.70 or higher to regenerate the
    configure script.  Bug #972.
  * sudo_logsrvd now has a relay mode which can be used to create
    a hierarchy of log servers.  By default, when a relay server is
    defined, messages from the client are forwarded immediately to
    the relay.  However, if the "store_first" setting is enabled,
    the log will be stored locally until the command completes and
    then relayed.  Bug #965.
  * Sudo now links with OpenSSL by default if it is available unless
    the --disable-openssl configure option is used or both the

OBS-URL: https://build.opensuse.org/request/show/892573
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=123
2021-05-15 21:15:47 +00:00
dcdcdf182d Accepting request 892541 from home:kstreitova:branches:Base:System
- update to 1.9.7
  * The "fuzz" Makefile target now runs all the fuzzers for 8192
    passes (can be overridden via the FUZZ_RUNS variable).  This makes
    it easier to run the fuzzers in-tree.  To run a fuzzer indefinitely,
    set FUZZ_RUNS=-1, e.g. "make FUZZ_RUNS=-1 fuzz".
  * Fixed fuzzing on FreeBSD where the ld.lld linker returns an
    error by default when a symbol is multiply-defined.
  * Added support for determining local IPv6 addresses on systems
    that lack the getifaddrs() function.  This now works on AIX,
    HP-UX and Solaris (at least).  Bug #969.
  * Fixed a bug introduced in sudo 1.9.6 that caused "sudo -V" to
    report a usage error.  Also, when invoked as sudoedit, sudo now
    allows a more restricted set of options that matches the usage
    statement and documentation.  GitHub issue #95.
  * Fixed a crash in sudo_sendlog when the specified certificate
    or key does not exist or is invalid.  Bug #970
  * Fixed a compilation error when sudo is configured with the
    --disable-log-client option.
  * Sudo's limited support for SUCCESS=return entries in nsswitch.conf
    is now documented.  Bug #971.
  * Sudo now requires autoconf 2.70 or higher to regenerate the
    configure script.  Bug #972.
  * sudo_logsrvd now has a relay mode which can be used to create
    a hierarchy of log servers.  By default, when a relay server is
    defined, messages from the client are forwarded immediately to
    the relay.  However, if the "store_first" setting is enabled,
    the log will be stored locally until the command completes and
    then relayed.  Bug #965.
  * Sudo now links with OpenSSL by default if it is available unless
    the --disable-openssl configure option is used or both the

OBS-URL: https://build.opensuse.org/request/show/892541
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=198
2021-05-12 15:43:09 +00:00
a4d639a899 Accepting request 886601 from Base:System
OBS-URL: https://build.opensuse.org/request/show/886601
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=122
2021-04-22 16:03:36 +00:00
a2c551b38d Accepting request 886334 from home:dirkmueller:Factory
- update to 1.9.6p1
 * Fixed a regression introduced in sudo 1.9.6 that resulted in an
   error message instead of a usage message when sudo is run with
   no arguments.
 * Fixed a sudo_sendlog compilation problem with the AIX xlC compiler.
 * Fixed a regression introduced in sudo 1.9.4 where the
   --disable-root-mailer configure option had no effect.
 * Added a --disable-leaks configure option that avoids some
   memory leaks on exit that would otherwise occur.  This is intended
   to be used with development tools that measure memory leaks.  It
   is not safe to use in production at this time.
 * Plugged some memory leaks identified by oss-fuzz and ASAN.
 * Fixed the handling of sudoOptions for an LDAP sudoRole that
   contains multiple sudoCommands.  Previously, some of the options
   would only be applied to the first sudoCommand.
 * Fixed a potential out of bounds read in the parsing of NOTBEFORE
   and NOTAFTER sudoers command options (and their LDAP equivalents).
 * The parser used for reading I/O log JSON files is now more
   resilient when processing invalid JSON.
 * Fixed typos that prevented "make uninstall" from working.
 * Fixed a regression introduced in sudo 1.9.4 where the last line
   in a sudoers file might not have a terminating NUL character
   added if no newline was present.
 * Integrated oss-fuzz and LLVM's libFuzzer with sudo.  The new
   --enable-fuzzer configure option can be combined with the
   --enable-sanitizer option to build sudo with fuzzing support.
   Multiple fuzz targets are available for fuzzing different parts
   of sudo.  Fuzzers are built and tested via "make fuzz" or as part
   of "make check" (even when sudo is not built with fuzzing support).
   Fuzzing support currently requires the LLVM clang compiler (not gcc).

OBS-URL: https://build.opensuse.org/request/show/886334
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=196
2021-04-19 08:23:29 +00:00
afef573fda Accepting request 867171 from Base:System
OBS-URL: https://build.opensuse.org/request/show/867171
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=121
2021-01-27 17:57:02 +00:00
f367b20479 Accepting request 867170 from home:simotek:branches:Base:System
Add some bugzilla references used in SLE and Leap to make some bots happy

OBS-URL: https://build.opensuse.org/request/show/867170
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=194
2021-01-27 12:10:14 +00:00
706ef1b183 Accepting request 867021 from home:simotek:branches:Base:System
- Update to 1.9.5.p2
    * When invoked as sudoedit, the same set of command line
      options are now accepted as for sudo -e. The -H and -P
      options are now rejected for sudoedit and sudo -e which
      matches the sudo 1.7 behavior. This is part of the fix for
      CVE-2021-3156.
    * Fixed a potential buffer overflow when unescaping backslashes
      in the command's arguments. Normally, sudo escapes special
      characters when running a command via a shell (sudo -s or
      sudo -i). However, it was also possible to run sudoedit with
      the -s or -i flags in which case no escaping had actually
      been done, making a buffer overflow possible.
      This fixes CVE-2021-3156. (bsc#1181090)
    * Fixed sudo's setprogname(3) emulation on systems that don't
      provide it.
    * Fixed a problem with the sudoers log server client where a
      partial write to the server could result the sudo process
      consuming large amounts of CPU time due to a cycle in the
      buffer queue. Bug #954.
    * Added a missing dependency on libsudo_util in libsudo_eventlog.
      Fixes a link error when building sudo statically.
    * The user's KRB5CCNAME environment variable is now preserved
      when performing PAM authentication. This fixes GSSAPI
      authentication when the user has a non-default ccache.

OBS-URL: https://build.opensuse.org/request/show/867021
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=193
2021-01-27 06:57:42 +00:00
5c0ac59b2d Accepting request 863081 from Base:System
OBS-URL: https://build.opensuse.org/request/show/863081
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=120
2021-01-18 10:27:27 +00:00
9eb248bcec Accepting request 863080 from home:kstreitova:branches:Base:System
- Update to 1.9.5.p1
  * Fixed a regression introduced in sudo 1.9.5 where the editor run
    by sudoedit was set-user-ID root unless SELinux RBAC was in use.
    The editor is now run with the user's real and effective user-IDs.
- News in 1.9.5
  * Fixed a crash introduced in 1.9.4 when running "sudo -i" as an
    unknown user.  This is related to but distinct from Bug #948.
  * If the "lecture_file" setting is enabled in sudoers, it must now
    refer to a regular file or a symbolic link to a regular file.
  * Fixed a potential use-after-free bug in sudo_logsrvd when the
    server shuts down if there are existing connections from clients
    that are only logging events and not session I/O data.
  * Fixed a buffer size mismatch when serializing the list of IP
    addresses for configured network interfaces.  This bug is not
    actually exploitable since the allocated buffer is large enough
    to hold the list of addresses.
  * If sudo is executed with a name other than "sudo" or "sudoedit",
    it will now fall back to "sudo" as the program name.  This affects
    warning, help and usage messages as well as the matching of Debug
    lines in the /etc/sudo.conf file.  Previously, it was possible
    for the invoking user to manipulate the program name by setting
    argv[0] to an arbitrary value when executing sudo.
  * Sudo now checks for failure when setting the close-on-exec flag
    on open file descriptors.  This should never fail but, if it
    were to, there is the possibility of a file descriptor leak to
    a child process (such as the command sudo runs).
  * Fixed CVE-2021-23239, a potential information leak in sudoedit
    that could be used to test for the existence of directories not
    normally accessible to the user in certain circumstances.  When
    creating a new file, sudoedit checks to make sure the parent

OBS-URL: https://build.opensuse.org/request/show/863080
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=191
2021-01-14 12:56:29 +00:00
ecf254c1e7 Accepting request 858237 from Base:System
OBS-URL: https://build.opensuse.org/request/show/858237
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=119
2020-12-24 18:37:30 +00:00
67744f343b Accepting request 858236 from home:kstreitova:branches:Base:System
- Update to 1.9.4p2
  * Fixed a bug introduced in sudo 1.9.4p1 which could lead to a crash
    if the sudoers file contains a runas user-specific Defaults entry.
    Bug #951.
- News in 1.9.4p1
  * Fixed a regression introduced in version 1.9.4 where sudo would
    not build when configured using the --without-sendmail option.
    Bug #947.
  * Fixed a problem where if I/O logging was disabled and sudo was
    unable to connect to sudo_logsrvd, the command would still be
    allowed to run even when the "ignore_logfile_errors" sudoers
    option was enabled.
  * Fixed a crash introduced in version 1.9.4 when attempting to run
    a command as a non-existent user.  Bug #948.
  * The installed sudo.conf file now has the default sudoers Plugin
    lines commented out.  This fixes a potential conflict when there
    is both a system-installed version of sudo and a user-installed
    version.  GitHub issue #75.
  * Fixed a regression introduced in sudo 1.9.4 where sudo would run
    the command as a child process even when a pseudo-terminal was
    not in use and the "pam_session" and "pam_setcred" options were
    disabled.  GitHub issue #76.
  * Fixed a regression introduced in sudo 1.8.9 where the "closefrom"
    sudoers option could not be set to a value of 3.  Bug #950.

OBS-URL: https://build.opensuse.org/request/show/858236
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=189
2020-12-23 00:37:04 +00:00
c51d123007 Accepting request 853290 from Base:System
OBS-URL: https://build.opensuse.org/request/show/853290
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=118
2020-12-08 12:23:44 +00:00
eb1d457912 Accepting request 851947 from home:kstreitova:branches:Base:System
- Update to 1.9.4
  * The sudoers parser will now detect when an upper-case reserved
    word is used when declaring an alias.  Now instead of "syntax
    error, unexpected CHROOT, expecting ALIAS" the message will be
    "syntax error, reserved word CHROOT used as an alias name".
    Bug #941.
  * Better handling of sudoers files without a final newline.
    The parser now adds a newline at end-of-file automatically which
    removes the need for special cases in the parser.
  * Fixed a regression introduced in sudo 1.9.1 in the sssd back-end
    where an uninitialized pointer could be freed on an error path.
    GitHub issue #67.
  * The core logging code is now shared between sudo_logsrvd and
    the sudoers plugin.
  * JSON log entries sent to syslog now use "minimal" JSON which
    skips all non-essential whitespace.
  * The sudoers plugin can now produce JSON-formatted logs.  The
    "log_format" sudoers option can be used to select sudo or json
    format logs.  The default is sudo format logs.
  * The sudoers plugin and visudo now display the column number in
    syntax error messages in addition to the line number.  Bug #841.
  * If I/O logging is not enabled but "log_servers" is set, the
    sudoers plugin will now log accept events to sudo_logsrvd.
    Previously, the accept event was only sent when I/O logging was
    enabled.  The sudoers plugin now sends reject and alert events too.
  * The sudo logsrv protocol has been extended to allow an AlertMessage
    to contain an optional array of InfoMessage, as AcceptMessage
    and RejectMessage already do.
  * Fixed a bug in sudo_logsrvd where receipt of SIGHUP would result
    in duplicate entries in the debug log when debugging was enabled.

OBS-URL: https://build.opensuse.org/request/show/851947
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=187
2020-12-05 17:13:38 +00:00
76e78fce99 Accepting request 850806 from Base:System
OBS-URL: https://build.opensuse.org/request/show/850806
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=117
2020-11-26 22:12:07 +00:00
67aea91c5c Accepting request 850805 from home:kstreitova:branches:Base:System
[bsc#1162675]

OBS-URL: https://build.opensuse.org/request/show/850805
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=185
2020-11-25 18:35:03 +00:00
3c934f78b3 Accepting request 848942 from Base:System
OBS-URL: https://build.opensuse.org/request/show/848942
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=116
2020-11-21 11:39:16 +00:00
921bef68a5 Accepting request 848421 from home:kstreitova:branches:Base:System
- Update to 1.9.3p1
  * Fixed a regression introduced in sudo 1.9.3 where the configure
    script would not detect the crypt(3) function if it was present
    in the C library, not an additional library.
  * Fixed a regression introduced in sudo 1.8.23 with shadow passwd
    file authentication on OpenBSD.  BSD authentication was not
    affected.
  * Sudo now logs when a user-specified command-line option is
    rejected by a sudoers rule.  Previously, these conditions were
    written to the audit log, but the default sudo log file.  Affected
    command line arguments include -C (--close-from), -D (--chdir),
    -R (--chroot), -g (--group) and -u (--user).
- News in 1.9.3
  * Fixed building the Python plugin on systems with a compiler that
    doesn't support symbol hiding.
  * Sudo now uses a linker script to hide symbols even when the
    compiler has native symbol hiding support.  This should make it
    easier to detect omissions in the symbol exports file, regardless
    of the platform.
  * Fixed the libssl dependency in Debian packages for older releases
    that use libssl1.0.0.
  * Sudo and visudo now provide more detailed messages when a syntax
    error is detected in sudoers.  The offending line and token are
    now displayed.  If the parser was generated by GNU bison,
    additional information about what token was expected is also
    displayed.  Bug #841.
  * Sudoers rules must now end in either a newline or the end-of-file.
    Previously, it was possible to have multiple rules on a single
    line, separated by white space.  The use of an end-of-line
    terminator makes it possible to display accurate error messages.

OBS-URL: https://build.opensuse.org/request/show/848421
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=183
2020-11-16 19:04:11 +00:00
0009b7713c Accepting request 833520 from Base:System
OBS-URL: https://build.opensuse.org/request/show/833520
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=115
2020-09-14 10:03:54 +00:00
85a5bf7b1e Accepting request 832691 from home:mvarlese:branches:Base:System
- Modified the secure_path to include the other two default paths 
  which are commonly available to $user. This will offer a better
  and more consistent UX.

OBS-URL: https://build.opensuse.org/request/show/832691
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=181
2020-09-10 15:58:50 +00:00
56b1f3fa8c Accepting request 830736 from Base:System
OBS-URL: https://build.opensuse.org/request/show/830736
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=114
2020-09-01 18:04:43 +00:00
d429a52e63 Accepting request 829280 from home:olh:branches:Base:System
- This rpm packages decides about the permissions of /etc/sudoers.d

OBS-URL: https://build.opensuse.org/request/show/829280
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=179
2020-08-31 10:31:58 +00:00
3e2b8f7393 Accepting request 822941 from Base:System
OBS-URL: https://build.opensuse.org/request/show/822941
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=113
2020-07-28 15:23:34 +00:00
15dabdc9eb Accepting request 822654 from home:polslinux:branches:Base:System
- Update to 1.9.2:
  * The configure script now uses pkg-config to find the openssl cflags
    and libs where possible.
  * The contents of the log.json I/O log file is now documented in
    the sudoers manual.
  * The sudoers plugin now properly exports the sudoers_audit symbol
    on systems where the compiler lacks symbol visibility controls.
    This caused a regression in 1.9.1 where a successful sudo command
    was not logged due to the missing audit plugin. Bug #931.
  * Fixed a regression introduced in 1.9.1 that can result in crash
    when there is a syntax error in the sudoers file. Bug #934.
- Rebase sudo-sudoers.patch

OBS-URL: https://build.opensuse.org/request/show/822654
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=177
2020-07-27 09:19:24 +00:00
dcd2c9420e Accepting request 818179 from Base:System
OBS-URL: https://build.opensuse.org/request/show/818179
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=112
2020-07-06 14:13:54 +00:00
dbdbd2f5a2 Accepting request 817736 from home:kukuk:branches:Base:System
- Move python plugin support to own sub-package, we don't want
  python in a really minimal system [bsc#1173200]

OBS-URL: https://build.opensuse.org/request/show/817736
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=175
2020-07-01 21:57:29 +00:00
98e2460df4 Accepting request 816529 from Base:System
OBS-URL: https://build.opensuse.org/request/show/816529
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=111
2020-06-25 14:46:26 +00:00
b5bdc3e34f Accepting request 815881 from home:vitezslav_cizek:branches:Base:System
- Update to 1.9.1
  * Fixed an AIX-specific problem when I/O logging was enabled.
     The terminal device was not being properly set to raw mode.
     Bug #927.
   * Corrected handling of sudo_logsrvd connections without associated
     I/O log data.  This fixes support for RejectMessage as well as
     AcceptMessage when the expect_iobufs flag is not set.
   * Added an "iolog_path" entry to the JSON-format event log produced
     by sudo_logsrvd.  Previously, it was only possible to determine
     the I/O log file an event belonged to using sudo-format logs.
   * Fixed the bundle IDs for sudo-logsrvd and sudo-python macOS packages.
   * I/O log files produced by the sudoers plugin now clear the write
     bits on the I/O log timing file when the log is complete.  This
     is consistent with how sudo_logsrvd indicates that a log is
     complete.
   * The sudoreplay utility has a new "-F" (follow) command line
     option to allow replaying a session that is still in progress,
     similar to "tail -f".
   * The @include and @includedir directives can be used in sudoers
     instead of #include and #includedir.  In addition, include paths
     may now have embedded white space by either using a double-quoted
     string or escaping the space characters with a backslash.
   * When running a command in a pty, sudo will no longer try to
     suspend itself if the user's tty has been revoked (for instance
     when the parent ssh daemon is killed).  This fixes a bug where
     sudo would continuously suspend the command (which would succeed),
     then suspend itself (which would fail due to the missing tty)
     and then resume the command.
   * If sudo's event loop fails due to the tty being revoked, remove
     the user's tty events and restart the event loop (once).  This

OBS-URL: https://build.opensuse.org/request/show/815881
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=173
2020-06-23 09:01:54 +00:00
91b6e6fb29 Accepting request 807048 from Base:System
OBS-URL: https://build.opensuse.org/request/show/807048
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=110
2020-05-20 16:37:15 +00:00
1b5790329f Accepting request 807045 from home:kstreitova:branches:Base:System
- Update to 1.9.0 (current stable release)
  * for changes between version 1.9.0 and 1.8.31p1 see rc changes
    below

OBS-URL: https://build.opensuse.org/request/show/807045
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=171
2020-05-18 20:53:40 +00:00
097139f659 Accepting request 802665 from home:kstreitova:branches:Base:System
- Update to 1.9.0rc5
  * The default TLS listener is now only enabled when either the
    TLS certificate file is explicitly specified in sudo_logsrvd.conf
    or the default TLS certificate file exists in the file system.
    There is no change in behavior for listen_address entries
    explicitly set in the configuration file.

OBS-URL: https://build.opensuse.org/request/show/802665
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=170
2020-05-14 17:32:58 +00:00
886f84dad7 Accepting request 801234 from Base:System
OBS-URL: https://build.opensuse.org/request/show/801234
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=109
2020-05-09 17:52:18 +00:00
282f49c3fc Accepting request 801195 from home:kstreitova:branches:Base:System
- Update to 1.9.0rc4
  * Various spelling fixes. Bug #925.
  * The struct passwd passed to PAM session modules is now looked up
    by user name, not user-ID, when possible. Fixes a problem with
    the pam_limits module and configurations where multiple user names
    share the same ID. Debian bug #734752.
  * Sudo command line options that take a value may only be specified
    once. This is to help guard against problems caused by poorly
    written scripts that invoke sudo with user-controlled input. Bug #924. 

- Update to 1.9.0rc3
  * The sudo-logsrvd package now installs a systemd service on Linux
    distros that use systemd.
  * The I/O plugin is now closed before the policy plugin on command
    exit.
  * When copying the edited files to the original path, sudoedit now
    allocates any additional space needed before writing. Previously,
    it could truncate the destination file if the file system was
    full. Bug #922.
  * Fixed a compilation issue with Python 3.8.
  * Changed how TLS connections are made to the log server. Instead
    of using a starttls type approach where TLS and plaintext
    connections share the same point we now use separate ports for
    plaintext and TLS connections. A (tls) flag can be specified after
    the host:port to indicate that the connection should be secured
    with TLS. This avoids a potention man-in-the-middle attack that
    could cause the connection to be forced into plaintext mode.
    Unfortunately, this change breaks compatibility with the
    previous release candidates.

OBS-URL: https://build.opensuse.org/request/show/801195
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=168
2020-05-07 13:00:36 +00:00
5d9be849da Accepting request 794970 from Base:System
OBS-URL: https://build.opensuse.org/request/show/794970
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=108
2020-04-22 18:43:08 +00:00
33bc44b1c2 Accepting request 794969 from home:kstreitova:branches:Base:System
- build with enable-python to support python plugins

OBS-URL: https://build.opensuse.org/request/show/794969
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=166
2020-04-17 17:15:44 +00:00
0c25f52ff5 Add python3 BuildRequires
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=165
2020-04-17 16:51:00 +00:00
3ed4d64671 Accepting request 794915 from home:kstreitova:branches:Base:System
- Update to 1.9.0rc2
  * Fixed a test failure in the strsig_test regress test on FreeBSD.
  * Sudo now includes a logging daemon, sudo_logsrvd, which can be
    used to implement centralized logging of I/O logs.  TLS connections
    are supported when sudo is configured with the --enable-openssl
    option.  For more information, see the sudo_logsrvd, logsrvd.conf
    and sudo_logsrv.proto manuals as well as the log_servers setting
    in the sudoers manual.
    The --disable-log-server and --disable-log-client configure
    options can be used to disable building the I/O log server and/or
    remote I/O log support in the sudoers plugin.
  * The new sudo_sendlog utility can be used to test sudo_logsrvd
    or send existing sudo I/O logs to a centralized server.
  * It is now possible to write sudo plugins in Python 3 when sudo
    is configured with the --enable-python> option.  See the
    sudo_plugin_python.man.html manual for details.
    Sudo 1.9.0 comes with several Python example plugins that get
    installed sudo's examples directory.
    The sudo blog article "What's new in sudo 1.9: Python"
    (https://blog.sudo.ws/posts/2020/01/whats-new-in-sudo-1.9-python/)
    includes a simple tutorial on writing python plugins.
  * Sudo now supports an "audit" plugin type.  An audit plugin
    receives accept, reject, exit and error messages and can be used
    to implement custom logging that is independent of the underlying
    security policy.   Multiple audit plugins may be specified in
    the sudo.conf file.  A sample audit plugin is included that
    writes logs in JSON format.
  * Sudo now supports an "approval" plugin type.  An approval plugin
    is run only after the main security policy (such as sudoers) accepts
    a command to be run.  The approval policy may perform additional

OBS-URL: https://build.opensuse.org/request/show/794915
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=164
2020-04-17 16:50:20 +00:00
125c0406ef Accepting request 785885 from Base:System
OBS-URL: https://build.opensuse.org/request/show/785885
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=107
2020-03-19 18:45:31 +00:00
1d4f8044cd Accepting request 785827 from home:polslinux:branches:Base:System
- Update to 1.8.31p1
  * Sudo once again ignores a failure to restore the RLIMIT_CORE
    resource limit, as it did prior to version 1.8.29.
    Linux containers don't allow RLIMIT_CORE to be set back to
    RLIM_INFINITY if we set the limit to zero, even for root,
    which resulted in a warning from sudo.

OBS-URL: https://build.opensuse.org/request/show/785827
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=162
2020-03-17 10:42:59 +00:00
6ef976cb00 Accepting request 772143 from Base:System
OBS-URL: https://build.opensuse.org/request/show/772143
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=106
2020-02-15 21:23:40 +00:00
ac3c196343 Accepting request 772142 from home:kstreitova:branches:Base:System
- Update to 1.8.31
  Major changes between version 1.8.31 and 1.8.30:
  * This version fixes a potential security issue that can lead to
    a buffer overflow if the pwfeedback option is enabled in
    sudoers [CVE-2019-18634] [bsc#1162202]
  * The sudoedit_checkdir option now treats a user-owned directory
    as writable, even if it does not have the write bit set at the
    time of check. Symbolic links will no longer be followed by
    sudoedit in any user-owned directory. Bug #912.
  * Fixed a crash introduced in sudo 1.8.30 when suspending sudo
    at the password prompt. Bug #914.
  * Fixed compilation on systems where the mmap MAP_ANON flag is
    not available. Bug #915.
  Major changes between version 1.8.30 and 1.8.29:
  * Sudo now closes file descriptors before changing uids. This
    prevents a non-root process from interfering with sudo's ability
    to close file descriptors on systems that support the prlimit(2)
    system call.
  * Sudo now treats an attempt to run sudo sudoedit as simply
    sudoedit If the sudoers file contains a fully-qualified path
    to sudoedit, sudo will now treat it simply as sudoedit
    (with no path). Visudo will will now treat a fully-qualified
    path to sudoedit as an error. Bug #871.
  * Fixed a bug introduced in sudo 1.8.28 where sudo would warn
    about a missing /etc/environment file on AIX and Linux when
    PAM is not enabled. Bug #907.
  * Fixed a bug on Linux introduced in sudo 1.8.29 that prevented
    the askpass program from running due to an unlimited stack size
    resource limit. Bug #908.
  * If a group provider plugin has optional arguments, the argument

OBS-URL: https://build.opensuse.org/request/show/772142
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=160
2020-02-07 16:27:51 +00:00
d5d48c17b0 Accepting request 756015 from Base:System
OBS-URL: https://build.opensuse.org/request/show/756015
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=105
2019-12-18 13:43:05 +00:00
6db166dae8 Accepting request 754614 from home:kukuk:branches:Base:System
- Move pam.d/sudo* files to /usr/etc

OBS-URL: https://build.opensuse.org/request/show/754614
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=158
2019-12-12 09:24:53 +00:00
0f9ceb41c1 Accepting request 743446 from Base:System
OBS-URL: https://build.opensuse.org/request/show/743446
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=104
2019-10-30 13:42:14 +00:00
7c6c82c48c Accepting request 738914 from home:vitezslav_cizek:branches:Base:System
- Update to 1.8,28p1
  * The fix for Bug #869 caused "sudo -v" to prompt for a password
    when "verifypw" is set to "all" (the default) and all of the
    user's sudoers entries are marked with NOPASSWD.  Bug #901.

- Update to 1.8.28
 * Fixed CVE-2019-14287 (bsc#1153674),
   a bug where a sudo user may be able to
   run a command as root when the Runas specification explicitly
   disallows root access as long as the ALL keyword is listed first.
   * Sudo will now only set PAM_TTY to the empty string when no
   terminal is present on Solaris and Linux.  This workaround is
   only needed on those systems which may have PAM modules that
   misbehave when PAM_TTY is not set.
 * The mailerflags sudoers option now has a default value even if
   sendmail support was disabled at configure time.  Fixes a crash
   when the mailerpath sudoers option is set but mailerflags is not.
   Bug #878.
 * Sudo will now filter out last login messages on HP-UX unless it
   a shell is being run via "sudo -s" or "sudo -i".  Otherwise,
   when trusted mode is enabled, these messages will be displayed
   for each command.
 * Sudo has a new -B command line option that will ring the terminal
   bell when prompting for a password.
 * Sudo no longer refuses to prompt for a password when it cannot
   determine the user's terminal as long as it can open /dev/tty.
   This allows sudo to function on systems where /proc is unavailable,
   such as when running in a chroot environment.
 * The "env_editor" sudoers flag is now on by default.  This makes
   source builds more consistent with the packages generated by

OBS-URL: https://build.opensuse.org/request/show/738914
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=156
2019-10-28 10:04:59 +00:00
31f8884bee Accepting request 724506 from Base:System
OBS-URL: https://build.opensuse.org/request/show/724506
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=103
2019-08-27 13:20:45 +00:00
69d80cc452 Accepting request 724360 from home:okurz:branches:Base:System
Correct typo in sudoers patch

OBS-URL: https://build.opensuse.org/request/show/724360
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=154
2019-08-19 08:38:01 +00:00
dd701fbc00 Accepting request 666133 from Base:System
OBS-URL: https://build.opensuse.org/request/show/666133
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=102
2019-01-29 13:44:27 +00:00
3bfee6a8e5 Accepting request 665339 from home:seanlew:branches:Base:System
Update sudo

OBS-URL: https://build.opensuse.org/request/show/665339
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=152
2019-01-15 08:13:29 +00:00
51433b9ed1 Accepting request 650509 from Base:System
OBS-URL: https://build.opensuse.org/request/show/650509
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=101
2018-11-22 12:23:26 +00:00
fdc58f7a5a Accepting request 649898 from home:seanlew:branches:Base:System
Update sudo to 1.8.26

OBS-URL: https://build.opensuse.org/request/show/649898
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=150
2018-11-20 14:30:18 +00:00
8f2cc83285 Accepting request 637025 from Base:System
OBS-URL: https://build.opensuse.org/request/show/637025
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=100
2018-10-01 07:02:33 +00:00
52d6fbb416 Accepting request 636863 from home:kstreitova:branches:Base:System
- fix permissions for /var/lib/sudo and /var/lib/sudo/ts
  [bsc#1097643]

OBS-URL: https://build.opensuse.org/request/show/636863
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=148
2018-09-21 09:55:59 +00:00
9924b7e357 Accepting request 636351 from home:mcalabkova:branches:Base:System
- Update to 1.8.25p1
  * Fixed a bug introduced in sudo 1.8.25 that caused a crash on 
    systems that have the poll() function but not the ppoll() 
    function

OBS-URL: https://build.opensuse.org/request/show/636351
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=147
2018-09-18 12:51:45 +00:00
6f43d27269 Accepting request 633589 from Base:System
OBS-URL: https://build.opensuse.org/request/show/633589
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=99
2018-09-13 10:08:38 +00:00
b5ce2d1eca Accepting request 633291 from home:mcalabkova:branches:Base:System
- Update to 1.8.25
  * I/O log timing file entries now use a monotonic timer and 
    include nanosecond precision
  * when sudo runs a command in a pseudo-tty, the slave device is 
    now closed in the main process immediately after starting the 
    monitor process
  * the testsudoers utility now supports querying an LDIF-format 
    policy

OBS-URL: https://build.opensuse.org/request/show/633291
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=145
2018-09-06 09:28:17 +00:00
b2e1d122f7 Accepting request 630800 from Base:System
OBS-URL: https://build.opensuse.org/request/show/630800
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=98
2018-08-28 07:22:46 +00:00
f9a253ec48 Accepting request 630762 from home:mcalabkova:branches:Base:System
- Update to 1.8.24
  * random insults are now more random 
  * added SUDO_CONV_PREFER_TTY flag for conversation function to 
    tell sudo to try writing to /dev/tty first
  * cvtsudoers can now parse base64-encoded attributes in LDIF 
    files

OBS-URL: https://build.opensuse.org/request/show/630762
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=143
2018-08-21 16:07:12 +00:00
f3da6b1903 Accepting request 624251 from Base:System
OBS-URL: https://build.opensuse.org/request/show/624251
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=97
2018-07-23 15:57:23 +00:00
60c0ac4137 Accepting request 622342 from home:bmwiedemann:branches:Base:System
Build with make -B to make package build reproducible

e.g. diff had a locale.c vs ./locale.c:

/usr/sbin/visudo differs in ELF section .rodata
@@ -13,8 +13,8 @@ 
  20120 636d6e64 5f616c6c 6f776564 00000000  cmnd_allowed....
  20130 66696e64 5f706174 6800676f 6f647061  find_path.goodpa
  20140 74682e63 00000000 7375646f 5f676f6f  th.c....sudo_goo
- 20150 64706174 68006c6f 63616c65 2e630043  dpath.locale.c.C
- 20160 00000000 00000000 25733a20 75736572  ........%s: user
+ 20150 64706174 68002e2f 6c6f6361 6c652e63  dpath../locale.c
+ 20160 00430000 00000000 25733a20 75736572  .C......%s: user
  20170 206c6f63 616c6520 25732c20 7375646f   locale %s, sudo
  20180 65727320 6c6f6361 6c652025 73000000  ers locale %s...
  20190 25733a20 73657474 696e6720 6c6f6361  %s: setting loca

OBS-URL: https://build.opensuse.org/request/show/622342
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=141
2018-07-20 11:29:06 +00:00
d506443bb6 Accepting request 603566 from Base:System
OBS-URL: https://build.opensuse.org/request/show/603566
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=96
2018-05-06 12:59:52 +00:00
25170bef0d Accepting request 603193 from home:stroeder:branches:Base:System
- Update to 1.8.23
  * primarily a bug fix release
  * new cvtsudoers utility (replaces sudoers2ldif) and converts
    between sudoers formats and perform some basic filtering.
  * removed obsolete sudoers2ldif-env.patch

OBS-URL: https://build.opensuse.org/request/show/603193
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=139
2018-05-03 08:02:38 +00:00
2d560cb03b Accepting request 597343 from Base:System
OBS-URL: https://build.opensuse.org/request/show/597343
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=95
2018-04-23 13:24:41 +00:00
b023d1651d Accepting request 597150 from home:kstreitova:branches:Base:System
- integrate pam_keyinit pam module [bsc#1081947]
  * add sudo-i.pamd PAM configuration file and install it as
    /etc/pam.d/sudo-i
  * add "session optional pam_keyinit.so revoke" to sudo.pamd and
    "session optional pam_keyinit.so force revoke" to sudo-i.pamd
  * add "--with-pam-login" build option to enable specific PAM
    session for "sudo -i"
- make pam configuration files (noreplace)
- reorganize Sources

OBS-URL: https://build.opensuse.org/request/show/597150
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=137
2018-04-17 08:06:20 +00:00
2b209e9f64 Accepting request 594820 from Base:System
OBS-URL: https://build.opensuse.org/request/show/594820
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=94
2018-04-16 10:43:13 +00:00
3af71ea9da Accepting request 593440 from home:kukuk:branches:Base:System
- Use %license instead of %doc [bsc#1082318]

OBS-URL: https://build.opensuse.org/request/show/593440
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=135
2018-04-09 09:41:40 +00:00
f828090e27 Accepting request 578010 from Base:System
- Fix sudo prompt: escape %p into %%p to ensure 'p' is not wrapped
  and interpreted as being an rpm variable (boo#1081470).

OBS-URL: https://build.opensuse.org/request/show/578010
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=93
2018-02-19 12:03:47 +00:00
6eb28ea1f9 Accepting request 577967 from home:dimstar:Factory
- Fix sudo prompt: escape %p into %%p to ensure 'p' is not wrapped
  and interpreted as being an rpm variable (boo#1081470).

OBS-URL: https://build.opensuse.org/request/show/577967
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=133
2018-02-19 10:49:40 +00:00
0dea457431 Accepting request 576060 from Base:System
OBS-URL: https://build.opensuse.org/request/show/576060
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=92
2018-02-16 20:40:11 +00:00
733596dd0b Accepting request 576059 from home:kstreitova:branches:Base:System
- The sudo distribution files are now signed with a new pgp key.
  Refresh sudo.keyring

- Update to 1.8.22 [bsc#1080793]

OBS-URL: https://build.opensuse.org/request/show/576059
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=131
2018-02-13 12:26:57 +00:00
fc0b553ce4 Accepting request 568794 from home:avindra
- Update to 1.8.22
  * Commands run in the background from a script run via sudo will
    no longer receive SIGHUP when the parent exits and I/O logging
    is enabled
  * A particularly offensive insult is now disabled by default
  * The description of sudo -i now correctly documents that the
    env_keep and env_check sudoers options are applied to the
    environment
  * Fixed a crash when the system's host name is not set
  * The sudoers2ldif script now handles #include and #includedir
    directives.
  * Fixed a bug where sudo would silently exit when the command
    was not allowed by sudoers and the passwd_tries sudoers option
    was set to a value less than one.
  * Fixed a bug with the listpw and verifypw sudoers options and
    multiple sudoers sources. If the option is set to all a
    password should be required unless none of a user's sudoers
    entries from any source require authentication.
  * Fixed a bug with the listpw and verifypw sudoers options in
    the LDAP and SSSD back-ends. If the option is set to any and
    the entry contained multiple rules, only the first matching
    rule was checked. If an entry contained more than one matching
    rule and the first rule required authentication but a
    subsequent rule did not, sudo would prompt for a password when
    it should not have.
  * When running a command as the invoking user (not root), sudo
    would execute the command with the same group vector it was
    started with. Sudo now executes the command with a new group
    vector based on the group database which is consistent with how
    su(1) operates.
  * Fixed a double free in the SSSD back-end that could occur when
    ipa_hostname is present in sssd.conf and is set to an unqualified
    host name.
  * When I/O logging is enabled, sudo will now write to the terminal
    even when it is a background process. Previously, sudo would only
    write to the tty when it was the foreground process when I/O
    logging was enabled. If the TOSTOP terminal flag is set, sudo
    will suspend the command (and then itself) with the SIGTTOU signal.
  * A new authfail_message sudoers option that overrides the default
    N incorrect password attempt(s).
  * An empty sudoRunAsUser attribute in the LDAP and SSSD backends
    will now match the invoking user. This is more consistent with
    how an empty runas user in the sudoers file is treated.
  * Documented that in check mode, visudo does not check the owner /
    mode on files specified with the -f flag
  * It is now an error to specify the runas user as an empty string
    on the command line. Previously, an empty runas user was treated
    the same as an unspecified runas user
  * When timestamp_type option is set to tty and a terminal is
    present, the time stamp record will now include the start time
    of the session leader. When the timestamp_type option is set
    to ppid or when no terminal is available, the start time of the
    parent process is used instead. This significantly reduces the
    likelihood of a time stamp record being re-used when a user logs
    out and back in again.
  * The sudoers time stamp file format is now documented in the new
    sudoers_timestamp manual.
  * Visudo will now use the SUDO_EDITOR environment variable (if
    present) in addition to VISUAL and EDITOR. 
- rebase sudoers2ldif-env.patch
- cleanup with spec-cleaner

OBS-URL: https://build.opensuse.org/request/show/568794
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=130
2018-01-24 11:27:07 +00:00
1cde0d82dd Accepting request 556001 from Base:System
OBS-URL: https://build.opensuse.org/request/show/556001
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=91
2017-12-13 10:57:53 +00:00
c2d7e5850a Accepting request 555983 from home:kstreitova:branches:Base:System
- remove sudoers.dist that is not needed [bsc#1071379]

OBS-URL: https://build.opensuse.org/request/show/555983
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=128
2017-12-11 14:43:16 +00:00
627619056b Accepting request 526347 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/526347
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=90
2017-09-18 17:50:39 +00:00
4817eb67fb Accepting request 525888 from home:kstreitova:branches:Base:System
- remove "--with-insults" and disable insults by default. Now
  insults sets are included but user must enable it in the sudoers
  file [bsc#1053911]

OBS-URL: https://build.opensuse.org/request/show/525888
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=126
2017-09-15 10:12:27 +00:00
37c343a593 Accepting request 522271 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/522271
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=89
2017-09-12 17:37:04 +00:00
Vítězslav Čížek
d65790fef1 Accepting request 522266 from home:stroeder:branches:Base:System
- update to 1.8.21p2

OBS-URL: https://build.opensuse.org/request/show/522266
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=124
2017-09-08 09:43:33 +00:00
67ef25f26a Accepting request 505125 from Base:System
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/505125
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=88
2017-06-29 13:08:51 +00:00
a08fbe3e8f OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=122 2017-06-13 16:29:37 +00:00
a94f80e226 Accepting request 500408 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/500408
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=87
2017-06-03 23:48:57 +00:00
Vítězslav Čížek
40ee4d9fc5 Accepting request 500303 from home:stroeder:branches:Base:System
update to 1.8.20p2

OBS-URL: https://build.opensuse.org/request/show/500303
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=120
2017-06-01 13:59:33 +00:00
9715fd989f Accepting request 499850 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/499850
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=86
2017-05-31 19:26:18 +00:00
Vítězslav Čížek
aae3725cc0 Accepting request 499849 from home:simotek:branches:Base:System
Security issue please approve

OBS-URL: https://build.opensuse.org/request/show/499849
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=118
2017-05-30 19:30:20 +00:00
960d34d01e Accepting request 477786 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/477786
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=85
2017-03-10 20:05:57 +00:00
5350e3c426 Accepting request 477147 from home:kstreitova:branches:Base:System
- update sudo in SLE12SP3 to the latest Factory version [fate#322095]
  * remove sudo-1.8.10p3-CVE-2016-7032.patch [bsc#1007766]
    * fixed in sudo 1.8.15
  * remove sudo-1.8.10p3-CVE-2016-7076.patch [bsc#1007501]
    * fixed in sudo 1.8.18p1
  * remove sudo-1.8.10p3-parse_boottime_properly.patch [bsc#899252]
    * fixed in sudo 1.8.14
  * remove sudo-1.8.10p3-user_groups.patch [bsc#988014]
    * fixed in sudo 1.8.17p1
  * remove sudo-1.8.10p3_pam_groups_upstream.patch [fate#318850]
    * fixed in sudo 1.8.17 
  * remove sudo-1.8.10p3-CVE-2014-9680.patch [bsc#917806]
    * fixed in sudo 1.8.12

OBS-URL: https://build.opensuse.org/request/show/477147
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=116
2017-03-08 15:53:23 +00:00
6077721eb4 Accepting request 453713 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/453713
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=84
2017-02-05 14:44:38 +00:00
0b246503a9 Accepting request 453650 from home:kstreitova:branches:Base:System
- add sudo-1.8.19p2-decrement_env_len.patch - In 
  sudo_unsetenv_nodebug(), decrement envp.env_len after removing
  the variable [bsc#981124]
- add sudo-1.8.19p2-dont_overwrite_ret_val.patch - don't overwrite
  the return value of ldap_sasl_interactive_bind_s() by the
  subsequent call to sudo_set_krb5_ccache_name() [bsc#981124]

OBS-URL: https://build.opensuse.org/request/show/453650
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=114
2017-02-01 06:48:54 +00:00
1ce25a0e11 Accepting request 450497 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/450497
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=83
2017-01-19 09:34:14 +00:00
c3b3e5cc11 Accepting request 450320 from home:stroeder:branches:Base:System
update to 1.8.19p2

OBS-URL: https://build.opensuse.org/request/show/450320
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=112
2017-01-16 12:29:14 +00:00
e279162d42 Accepting request 448723 from home:kstreitova:branches:Base:System
- add /usr/lib/tmpfiles.d directory to the %files section and fix
  build for SLE12SP2

OBS-URL: https://build.opensuse.org/request/show/448723
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=111
2017-01-05 09:56:38 +00:00
75391bf1c3 Accepting request 447202 from home:stroeder:branches:Base:System
update to 1.8.19p1 (not sure what the deal with /usr/lib/tmpfiles.d on older platforms is)

OBS-URL: https://build.opensuse.org/request/show/447202
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=110
2017-01-02 09:53:20 +00:00
360013f607 Accepting request 437696 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/437696
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=82
2016-11-03 10:12:31 +00:00
9052eff5a2 Accepting request 437620 from home:stroeder:branches:Base:System
update to 1.8.18p1

OBS-URL: https://build.opensuse.org/request/show/437620
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=108
2016-10-28 16:10:32 +00:00
caccaf6c96 Accepting request 431109 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/431109
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=81
2016-09-30 13:19:43 +00:00
edcbeba015 Accepting request 429188 from home:stroeder:branches:Base:System
update to upstream release 1.8.18

OBS-URL: https://build.opensuse.org/request/show/429188
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=106
2016-09-28 14:48:20 +00:00
9d449a4aed Accepting request 404258 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/404258
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=80
2016-07-01 07:53:48 +00:00
f28eb4234b Accepting request 404091 from home:stroeder:branches:Base:System
update to 1.8.17p1

OBS-URL: https://build.opensuse.org/request/show/404091
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=104
2016-06-23 14:49:06 +00:00
2edf02caab Accepting request 403502 from home:stroeder:branches:Base:System
update to upstream release 1.8.17

OBS-URL: https://build.opensuse.org/request/show/403502
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=103
2016-06-19 21:14:17 +00:00
7c7881b119 Accepting request 399716 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/399716
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=79
2016-06-07 21:43:29 +00:00
3f2b10cef4 Accepting request 397383 from home:Dremor:branches:Base:System
Adding localized prompt. Note : This prompt seem to be the only one that have been translated (other than the default one)

OBS-URL: https://build.opensuse.org/request/show/397383
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=101
2016-06-02 15:16:26 +00:00
a14c583aeb Accepting request 397216 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/397216
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=78
2016-05-25 19:21:28 +00:00
0844eb2aff Accepting request 396745 from home:kstreitova:branches:Base:System
- add "BuildRequires: cyrus-sasl-devel" to enable SASL
  authentication [bnc#979531]

OBS-URL: https://build.opensuse.org/request/show/396745
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=99
2016-05-21 10:08:11 +00:00
734cf422f8 Accepting request 392940 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/392940
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=77
2016-05-05 11:18:29 +00:00
2591981f96 Accepting request 392689 from home:kstreitova:branches:Base:System
- add sudo-1.8.16-pam_groups.patch to do group setup in
  policy_init_session() before calling out to the plugin. This makes
  it possible for the pam_group module to change the group in
  pam_setcred() [fate#318850]

OBS-URL: https://build.opensuse.org/request/show/392689
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=97
2016-04-29 18:42:40 +00:00
e59e6f6535 Accepting request 376392 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/376392
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=76
2016-03-26 14:11:50 +00:00
e3c141bcbe Accepting request 375498 from home:pluskalm:branches:Base:System
- Add gpg signature
- Use valid category for tests

OBS-URL: https://build.opensuse.org/request/show/375498
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=95
2016-03-21 10:14:29 +00:00
08f8bf6202 Accepting request 374691 from home:stroeder:branches:Base:System
update to 1.8.16

OBS-URL: https://build.opensuse.org/request/show/374691
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=94
2016-03-18 10:09:27 +00:00
0da57a3452 Accepting request 342694 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/342694
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=75
2015-11-12 18:39:25 +00:00
Vítězslav Čížek
48dca19f32 Accepting request 342689 from home:kstreitova:branches:Base:System
- update to 1.8.15:
  * Fixed a bug that prevented sudo from building outside the source 
    tree on some platforms. Bug #708.
  * Fixed the location of the sssd library in the RHEL/Centos packages.
    Bug #710.
  * Fixed a build problem on systems that don't implicitly include
    sys/types.h from other header files. Bug #711.
  * Fixed a problem on Linux using containers where sudo would ignore
    signals sent by a process in a different container.
  * Sudo now refuses to run a command if the PAM session module returns
    an error.
  * When editing files with sudoedit, symbolic links will no longer be
    followed by default. The old behavior can be restored by enabling
    the sudoedit_follow option in sudoers or on a per-command basis with
    the FOLLOW and NOFOLLOW tags. Bug #707.
  * Fixed a bug introduced in version 1.8.14 that caused the last valid
    editor in the sudoers "editor" list to be used by visudo and sudoedit
    instead of the first. Bug #714.
  * Fixed a bug in visudo that prevented the addition of a final newline
    to edited files without one.
  * Fixed a bug decoding certain base64 digests in sudoers when the
    intermediate format included a '=' character.
  * Individual records are now locked in the time stamp file instead of
    the entire file. This allows sudo to avoid prompting for a password
    multiple times on the same terminal when used in a pipeline.
    In other words, sudo cat foo | sudo grep bar now only prompts for
    the password once. Previously, both sudo processes would prompt for
    a password, often making it impossible to enter. Bug #705.
  * Fixed a bug where sudo would fail to run commands as a non-root user
    on systems that lack both setresuid() and setreuid(). Bug #713.

OBS-URL: https://build.opensuse.org/request/show/342689
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=92
2015-11-06 12:38:32 +00:00
b35bef07d0 Accepting request 323082 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/323082
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=74
2015-08-17 13:34:51 +00:00
Vítězslav Čížek
7f2e1861cb Accepting request 322223 from home:jengelh:branches:Base:System
- No need to buildrequire an sssd plugin (libsss_sudo)

OBS-URL: https://build.opensuse.org/request/show/322223
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=90
2015-08-14 10:56:15 +00:00
Vítězslav Čížek
89d972c0f7 Accepting request 322021 from home:dimstar:Factory
- Pass --enable-tmpfiles.d=%{_tmpfilesdir} to configure: let's be
  specific about this feature, and not randomly rely on the
  presence/absence of /usr/lib/tmpfiles.d/systemd.conf.
- Add systemd-rpm-macros BuildRequires to ensure %_tmpfilesdir is
  defined.
- Add relevant %tmpfiles_create call to post scriptlet.

OBS-URL: https://build.opensuse.org/request/show/322021
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=89
2015-08-14 10:55:19 +00:00
9e9c27eb36 Accepting request 318426 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/318426
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=73
2015-07-28 09:42:09 +00:00
685fdbfa5f Accepting request 318161 from home:kstreitova:branches:Base:System
- update to 1.8.14p3:
  * changes in 1.8.14p3
    * Fixed a bug introduced in sudo 1.8.14p2 that prevented sudo 
      from working when no tty was present. Bug #706.
    * Fixed tty detection on newer AIX systems where dev_t is 64-bit.
  * changes in 1.8.14p2
    * Fixed a bug introduced in sudo 1.8.14 that prevented the
      lecture file from being created. Bug #704.
  * changes in 1.8.14p1
    * Fixed a bug introduced in sudo 1.8.14 that prevented the sssd
      backend from working. Bug #703.
  * changes in 1.8.14
    * Log messages on Mac OS X now respect sudoers_locale when sudo
      is build with NLS support.
    * The sudo manual pages now pass mandoc -Tlint with no warnings.
    * Fixed a compilation problem on systems with the sig2str()
      function that do not define SIG2STR_MAX in signal.h.
    * Worked around a compiler bug that resulted in unexpected
      behavior when returning an int from a function declared to
      return bool without an explicit cast.
    * Worked around a bug in Mac OS X 10.10 BSD auditing where the
      au_preselect() fails for AUE_sudo events but succeeds for 
      AUE_DARWIN_sudo.
    * Fixed a hang on Linux systems with glibc when sudo is linked
      with jemalloc.
    * When the user runs a command as a user ID that is not present
      in the password database via the -u flag, the command is now
      run with the group ID of the invoking user instead of group ID 0.
    * Fixed a compilation problem on systems that don't pull in
      definitions of uid_t and gid_t without sys/types.h or unistd.h.

OBS-URL: https://build.opensuse.org/request/show/318161
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=87
2015-07-24 11:38:45 +00:00
Stephan Kulow
28d1f933ba Accepting request 318087 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/318087
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=72
2015-07-24 07:57:59 +00:00
9996afbfb6 Accepting request 317992 from home:elvigia:branches:Base:System
- BuildRequires zlib-devel, support zlib compressed I/O logs.

OBS-URL: https://build.opensuse.org/request/show/317992
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=85
2015-07-23 08:10:43 +00:00
Stephan Kulow
97d05716bf Accepting request 307418 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/307418
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=71
2015-05-16 18:08:01 +00:00
Stephan Kulow
56894f6274 Accepting request 307129 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.13
 * The examples directory is now a subdirectory of the doc dir to
   conform to Debian guidelines.  Bug #682.
 * Fixed a compilation error for siglist.c and signame.c on some
   systems.  Bug #686
 * Weak symbols are now used for sudo_warn_gettext() and
   sudo_warn_strerror() in libsudo_util to avoid link errors when
   -Wl,--no-undefined is used in LDFLAGS.  The --disable-weak-symbols
   configure option can be used to disable the user of weak symbols.
 * Fixed a bug in sudo's mkstemps() replacement function that
   prevented the file extension from being preserved in sudoedit.
 * A new mail_all_cmnds sudoers flag will send mail when a user runs
   a command (or tries to). The behavior of the mail_always flag has
   been restored to always send mail when sudo is run.
 * New "MAIL" and "NOMAIL" command tags have been added to toggle
   mail sending behavior on a per-command (or Cmnd_Alias) basis.
 * Fixed matching of empty passwords when sudo is configured to
   use passwd (or shadow) file authentication on systems where the
   crypt() function returns NULL for invalid salts.
 * The "all" setting for listpw and verifypw now works correctly
   with LDAP and sssd sudoers.
 * The sudo timestamp directory is now created at boot time on
   platforms that use systemd.
 * Sudo will now restore the value of the SIGPIPE handler before
   executing the command.
 * Sudo now uses "struct timespec" instead of "struct timeval" for
   time keeping when possible.  If supported, sudoedit and visudo
   now use nanosecond granularity time stamps.
 * Fixed a symbol name collision with systems that have their own
   SHA2 implementation.  This fixes a problem where PAM could use

OBS-URL: https://build.opensuse.org/request/show/307129
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=83
2015-05-16 05:20:18 +00:00
340806216f Accepting request 287253 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/287253
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=70
2015-02-27 09:56:53 +00:00
234260b2dd Accepting request 287223 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.12 (fixes bnc#918953)
- changelog:
  * The embedded copy of zlib has been upgraded to version 1.2.8 and
    is now installed as a shared library where supported.
  * Debug settings for the sudo front end and sudoers plugin are now configured separately.
  * Multiple sudo.conf Debug entries may now be specified per program (or plugin).
  * The plugin API has been extended such that the path to the plugin
    that was loaded is now included in the settings array. This path
    can be used to register with the debugging subsystem. The debug_flags
    setting is now prefixed with a file name and may be specified multiple
    times if there is more than one matching Debug setting in sudo.conf.
  * The sudoers regression tests now run with the locale set to C since
    some of the tests compare output that includes locale-specific messages. Bug #672.
  * Fixed a bug where sudo would not run commands on Linux when compiled
    with audit support if audit is disabled. Bug #671.
  * The default password prompt now includes a trailing space after
    "Password:" for consistency with su(1) on most systems. Bug #663.
  * Visudo will now use the optional sudoers_file, sudoers_mode,
    sudoers_uid and sudoers_gid arguments if specified on the sudoers.so Plugin line in the sudo.conf file.
  * Fixed a problem introduced in sudo 1.8.8 that prevented the full
    host name from being used when the fqdn sudoers option is used. Bug #678.
  * Sudo now installs a handler for SIGCHLD signal handler immediately
    before stating the process that will execute the command (or start the monitor).
  * Removed a limit on the length of command line arguments expanded by
    a wild card using sudo's version of the fnmatch() function.
    This limit was introduced when sudo's version of fnmatch() was replaced in sudo 1.8.4.
  * LDAP-based sudoers can now query an LDAP server for a user's netgroups
    directly. This is often much faster than fetching every sudoRole object
    containing a sudoUser that begins with a `+' prefix and checking
    whether the user is a member of any of the returned netgroups.

OBS-URL: https://build.opensuse.org/request/show/287223
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=81
2015-02-22 19:18:26 +00:00
Stephan Kulow
b3afab6433 Accepting request 265784 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/265784
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=69
2014-12-21 11:04:16 +00:00
b1b8a9f152 Accepting request 265535 from home:vitezslav_cizek:branches:Base:System
- correctly parse /proc/stat for boottime (bnc#899252)
  * added sudo-parse_boottime_properly.patch from Debian

OBS-URL: https://build.opensuse.org/request/show/265535
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=79
2014-12-18 14:02:26 +00:00
009c0c788b Accepting request 260242 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/260242
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=68
2014-11-15 10:44:23 +00:00
647b4ec060 Accepting request 260185 from home:fstrba
Update to the latest release

OBS-URL: https://build.opensuse.org/request/show/260185
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=77
2014-11-07 12:50:48 +00:00
Stephan Kulow
f1e27a5a46 Accepting request 256807 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/256807
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=67
2014-10-29 20:08:48 +00:00
Stephan Kulow
6b58d604a8 Accepting request 255758 from home:tabraham1:branches:Base:System
update to sudo-1.8.11p1

OBS-URL: https://build.opensuse.org/request/show/255758
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=75
2014-10-16 06:00:36 +00:00
Stephan Kulow
1cceaeffd4 Accepting request 234227 from Base:System
- update to 1.8.10p3
  * Fixed expansion of the %p escape in the prompt for "sudo -l"
    when rootpw, runaspw or targetpw is set. Bug #639.
  * Fixed matching of uids and gids which was broken in version 1.8.9
  * PAM credential initialization has been re-enabled. It was
    unintentionally disabled by default in version 1.8.8. The way
    credentials are initialized has also been fixed. Bug #642.
  * Fixed a descriptor leak on Linux when determing boot time. Sudo
    normally closes extra descriptors before running a command so
    the impact is limited. Bug #645.
  * Fixed flushing of the last buffer of data when I/O logging is
    enabled. This bug, introduced in version 1.8.9, could cause
    incomplete command output on some systems. Bug #646.
  * Fixed a hang introduced in sudo 1.8.10 when timestamp_timeout
    is set to zero. Bug #638.
- don't install test LICENSE with executable perms (forwarded request 234191 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/234227
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=65
2014-05-17 04:43:30 +00:00
Stephan Kulow
8540c79227 Accepting request 234191 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.10p3
  * Fixed expansion of the %p escape in the prompt for "sudo -l"
    when rootpw, runaspw or targetpw is set. Bug #639.
  * Fixed matching of uids and gids which was broken in version 1.8.9
  * PAM credential initialization has been re-enabled. It was
    unintentionally disabled by default in version 1.8.8. The way
    credentials are initialized has also been fixed. Bug #642.
  * Fixed a descriptor leak on Linux when determing boot time. Sudo
    normally closes extra descriptors before running a command so
    the impact is limited. Bug #645.
  * Fixed flushing of the last buffer of data when I/O logging is
    enabled. This bug, introduced in version 1.8.9, could cause
    incomplete command output on some systems. Bug #646.
  * Fixed a hang introduced in sudo 1.8.10 when timestamp_timeout
    is set to zero. Bug #638.
- don't install test LICENSE with executable perms

OBS-URL: https://build.opensuse.org/request/show/234191
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=73
2014-05-15 17:33:09 +00:00
Stephan Kulow
115ee49851 Accepting request 226049 from Base:System
- update to 1.8.10p1
  * Fixed a bug with netgated commands in "sudo -l command" that
    could cause the command to be listed even when it was explicitly
    denied. This only affected list mode when a command was specified.
    Bug #636.
  * It is now possible to disable network interface probing in sudo.conf
    by changing the value of the probe_interfaces setting.
  * When listing a user's privileges (sudo -l), the sudoers plugin
    will now prompt for the user's password even if the targetpw,
    rootpw or runaspw options are set.
  * The sudoers plugin uses a new format for its time stamp files.
    Bug #616.
  * sudo's -K option will now remove all of the user's time stamps,
    not just the time stamp for the current terminal.
    The -k option can be used to only disable time stamps for
    the current terminal.
  * If sudo was started in the background and needed to prompt for a
    password, it was not possible to suspend it at the password prompt
  * LDAP-based sudoers now uses a default search filter of
    (objectClass=sudoRole) for more efficient queries.
    The netgroup query has been modified to avoid falling below the
    minimum length for OpenLDAP substring indices.
  * The new use_netgroups sudoers option can be used to explicitly
    enable or disable netgroups support. For LDAP-based sudoers,
    netgroup support requires an expensive substring match on the server.
    If netgroups are not needed, this option can be disabled to
    reduce the load on the LDAP server.
  * Sudo is once again able to open the sudoers file when the group
    on sudoers doesn't match the expected value, so long as the
    file is not group writable. (forwarded request 225988 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/226049
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=64
2014-03-18 15:21:18 +00:00
Stephan Kulow
c78d53b990 Accepting request 225988 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.10p1
  * Fixed a bug with netgated commands in "sudo -l command" that
    could cause the command to be listed even when it was explicitly
    denied. This only affected list mode when a command was specified.
    Bug #636.
  * It is now possible to disable network interface probing in sudo.conf
    by changing the value of the probe_interfaces setting.
  * When listing a user's privileges (sudo -l), the sudoers plugin
    will now prompt for the user's password even if the targetpw,
    rootpw or runaspw options are set.
  * The sudoers plugin uses a new format for its time stamp files.
    Bug #616.
  * sudo's -K option will now remove all of the user's time stamps,
    not just the time stamp for the current terminal.
    The -k option can be used to only disable time stamps for
    the current terminal.
  * If sudo was started in the background and needed to prompt for a
    password, it was not possible to suspend it at the password prompt
  * LDAP-based sudoers now uses a default search filter of
    (objectClass=sudoRole) for more efficient queries.
    The netgroup query has been modified to avoid falling below the
    minimum length for OpenLDAP substring indices.
  * The new use_netgroups sudoers option can be used to explicitly
    enable or disable netgroups support. For LDAP-based sudoers,
    netgroup support requires an expensive substring match on the server.
    If netgroups are not needed, this option can be disabled to
    reduce the load on the LDAP server.
  * Sudo is once again able to open the sudoers file when the group
    on sudoers doesn't match the expected value, so long as the
    file is not group writable.

OBS-URL: https://build.opensuse.org/request/show/225988
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=71
2014-03-15 06:41:25 +00:00
Stephan Kulow
e23062cdbd Accepting request 220617 from Base:System
- added subpackage with a test for fate#313276 (forwarded request 215868 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/220617
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=63
2014-02-03 10:40:47 +00:00
Stephan Kulow
2e20424a47 Accepting request 215868 from home:vitezslav_cizek:branches:Base:System
- added subpackage with a test for fate#313276

OBS-URL: https://build.opensuse.org/request/show/215868
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=69
2014-02-02 18:13:19 +00:00
Stephan Kulow
2da245d3f4 Accepting request 215577 from Base:System
- update to 1.8.9p4
  * Fixed a bug where sudo could consume large amounts of CPU while
    the command was running when I/O logging is not enabled.
    Bug #631 (bnc#861153)
  * Fixed a bug where sudo would exit with an error when the debug
    level is set to util@debug or all@debug and I/O logging is not
    enabled. The command would continue runnning after sudo exited. (forwarded request 215575 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/215577
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=62
2014-01-30 05:55:47 +00:00
Vítězslav Čížek
9d9232ee84 Accepting request 215575 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.9p4
  * Fixed a bug where sudo could consume large amounts of CPU while
    the command was running when I/O logging is not enabled.
    Bug #631 (bnc#861153)
  * Fixed a bug where sudo would exit with an error when the debug
    level is set to util@debug or all@debug and I/O logging is not
    enabled. The command would continue runnning after sudo exited.

OBS-URL: https://build.opensuse.org/request/show/215575
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=67
2014-01-29 19:59:03 +00:00
Stephan Kulow
0b1c91b96f Accepting request 213957 from Base:System
- update to 1.8.9p3
- set secure_path to /usr/sbin:/usr/bin:/sbin:/bin
- changes since 1.8.8:
  * Fixed a bug introduced in sudo 1.8.9 that prevented the tty name
    from being resolved properly on Linux systems.  Bug #630.
  * Updated config.guess, config.sub and libtool to support the ppc64le
    architecture (IBM PowerPC Little Endian).
  * Fixed a problem with gcc 4.8's handling of bit fields that could
    lead to the noexec flag being enabled even when it was not
    explicitly set.
  * Reworked sudo's main event loop to use a simple event subsystem
    using poll(2) or select(2) as the back end.
  * It is now possible to statically compile the sudoers plugin into
    the sudo binary without disabling shared library support.  The
    sudo.conf file may still be used to configure other plugins.
  * Sudo can now be compiled again with a C preprocessor that does
    not support variadic macros.
  * Visudo can now export a sudoers file in JSON format using the
    new -x flag.
  * The locale is now set correctly again for visudo and sudoreplay.
  * The plugin API has been extended to allow the plugin to exclude
    specific file descriptors from the "closefrom" range.
  * There is now a workaround for a Solaris-specific problem where
    NOEXEC was overriding traditional root DAC behavior.
  * Add user netgroup filtering for SSSD. Previously, rules for
    a netgroup were applied to all even when they did not belong
    to the specified netgroup.
  * On systems with BSD login classes, if the user specified a group
    (not a user) to run the command as, it was possible to specify
    a different login class even when the command was not run as the (forwarded request 213857 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/213957
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=61
2014-01-17 10:16:49 +00:00
27d016fa1b Accepting request 213857 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.9p3
- set secure_path to /usr/sbin:/usr/bin:/sbin:/bin
- changes since 1.8.8:
  * Fixed a bug introduced in sudo 1.8.9 that prevented the tty name
    from being resolved properly on Linux systems.  Bug #630.
  * Updated config.guess, config.sub and libtool to support the ppc64le
    architecture (IBM PowerPC Little Endian).
  * Fixed a problem with gcc 4.8's handling of bit fields that could
    lead to the noexec flag being enabled even when it was not
    explicitly set.
  * Reworked sudo's main event loop to use a simple event subsystem
    using poll(2) or select(2) as the back end.
  * It is now possible to statically compile the sudoers plugin into
    the sudo binary without disabling shared library support.  The
    sudo.conf file may still be used to configure other plugins.
  * Sudo can now be compiled again with a C preprocessor that does
    not support variadic macros.
  * Visudo can now export a sudoers file in JSON format using the
    new -x flag.
  * The locale is now set correctly again for visudo and sudoreplay.
  * The plugin API has been extended to allow the plugin to exclude
    specific file descriptors from the "closefrom" range.
  * There is now a workaround for a Solaris-specific problem where
    NOEXEC was overriding traditional root DAC behavior.
  * Add user netgroup filtering for SSSD. Previously, rules for
    a netgroup were applied to all even when they did not belong
    to the specified netgroup.
  * On systems with BSD login classes, if the user specified a group
    (not a user) to run the command as, it was possible to specify
    a different login class even when the command was not run as the

OBS-URL: https://build.opensuse.org/request/show/213857
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=65
2014-01-15 10:13:18 +00:00
Tomáš Chvátal
e4d66cd544 Accepting request 202629 from Base:System
- update to 1.8.8
- drop sudo-plugins-sudoers-sssd.patch (upstream)
  * Removed a warning on PAM systems with stacked auth modules
    where the first module on the stack does not succeed.
  * Sudo, sudoreplay and visudo now support GNU-style long options.
  * The -h (--host) option may now be used to specify a host name.
    This is currently only used by the sudoers plugin in conjunction
    with the -l (--list) option.
  * Sudo's LDAP SASL support now works properly with Kerberos.
    Previously, the SASL library was unable to locate the user's
    credential cache.
  * It is now possible to set the nproc resource limit to unlimited
    via pam_limits on Linux (bug #565).
  * New "pam_service" and "pam_login_service" sudoers options
    that can be used to specify the PAM service name to use.
  * New "pam_session" and "pam_setcred" sudoers options that
    can be used to disable PAM session and credential support.
  * The sudoers plugin now properly supports UIDs and GIDs
    that are larger than 0x7fffffff on 32-bit platforms.
  * Fixed a visudo bug introduced in sudo 1.8.7 where per-group
    Defaults entries would cause an internal error.
  * If the "tty_tickets" sudoers option is enabled (the default),
    but there is no tty present, sudo will now use a ticket file
    based on the parent process ID.  This makes it possible to support
    the normal timeout behavior for the session.
  * Fixed a problem running commands that change their process
    group and then attempt to change the terminal settings when not
    running the command in a pseudo-terminal.  Previously, the process
    would receive SIGTTOU since it was effectively a background
    process.  Sudo will now grant the child the controlling tty and (forwarded request 202594 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/202629
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=60
2013-10-08 18:35:01 +00:00
cf6621d369 Accepting request 202594 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.8
- drop sudo-plugins-sudoers-sssd.patch (upstream)
  * Removed a warning on PAM systems with stacked auth modules
    where the first module on the stack does not succeed.
  * Sudo, sudoreplay and visudo now support GNU-style long options.
  * The -h (--host) option may now be used to specify a host name.
    This is currently only used by the sudoers plugin in conjunction
    with the -l (--list) option.
  * Sudo's LDAP SASL support now works properly with Kerberos.
    Previously, the SASL library was unable to locate the user's
    credential cache.
  * It is now possible to set the nproc resource limit to unlimited
    via pam_limits on Linux (bug #565).
  * New "pam_service" and "pam_login_service" sudoers options
    that can be used to specify the PAM service name to use.
  * New "pam_session" and "pam_setcred" sudoers options that
    can be used to disable PAM session and credential support.
  * The sudoers plugin now properly supports UIDs and GIDs
    that are larger than 0x7fffffff on 32-bit platforms.
  * Fixed a visudo bug introduced in sudo 1.8.7 where per-group
    Defaults entries would cause an internal error.
  * If the "tty_tickets" sudoers option is enabled (the default),
    but there is no tty present, sudo will now use a ticket file
    based on the parent process ID.  This makes it possible to support
    the normal timeout behavior for the session.
  * Fixed a problem running commands that change their process
    group and then attempt to change the terminal settings when not
    running the command in a pseudo-terminal.  Previously, the process
    would receive SIGTTOU since it was effectively a background
    process.  Sudo will now grant the child the controlling tty and

OBS-URL: https://build.opensuse.org/request/show/202594
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=63
2013-10-08 15:16:17 +00:00
Stephan Kulow
fbafe42fa5 Accepting request 182936 from Base:System
- fix the default flag settings in manual to reflect changes caused by
  sudo-sudoers.patch (bnc#823292) (forwarded request 182920 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/182936
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=58
2013-07-16 05:39:30 +00:00
f2a6be94a4 Accepting request 182920 from home:vitezslav_cizek:branches:Base:System
- fix the default flag settings in manual to reflect changes caused by
  sudo-sudoers.patch (bnc#823292)

OBS-URL: https://build.opensuse.org/request/show/182920
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=61
2013-07-12 14:58:55 +00:00
Stephan Kulow
589f9646a5 Accepting request 182711 from Base:System
- Added patch to resolve packaging error. Patch has been sent
  upstream.
  * E: sudo 64bit-portability-issue ./sssd.c:829

- Enable SSSD as a sudoers data source (forwarded request 182674 from deadpoint)

OBS-URL: https://build.opensuse.org/request/show/182711
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=57
2013-07-11 11:34:17 +00:00
3c05058870 Accepting request 182674 from home:deadpoint:branches:Base:System
- Added patch to resolve packaging error. Patch has been sent
  upstream.
  * E: sudo 64bit-portability-issue ./sssd.c:829

- Enable SSSD as a sudoers data source

OBS-URL: https://build.opensuse.org/request/show/182674
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=59
2013-07-10 11:58:09 +00:00
Stephan Kulow
96be893e29 Accepting request 181790 from Base:System
- restore accidentally dropped suse-specific patches 

  * remove CVE-2013-1775
  * remove CVE-2013-1776
  * The non-Unix group plugin is now supported when sudoers data is stored in LDAP.
  * User messages are now always displayed in the user's locale, even when the
  same message is being logged or mailed in a different locale.  
  * Log files created by sudo now explicitly have the group set to group ID 0
  rather than relying on BSD group semantics (which may not be the default).
  * A new exec_background sudoers option can be used to initially run the 
  command without read access to the terminal when running a command in a 
  pseudo-tty. 
  * Sudo now produces better error messages when there is an error in the sudo.conf file.
  * Two new settings have been added to sudo.conf to give the admin better control of 
  how group database queries are performed.
  * There is now a standalone sudo.conf manual page.
  * New support for specifying a SHA-2 digest along with the command in sudoers.
  Supported hash types are sha224, sha256, sha384 and sha512. See the description
  of Digest_Spec in the sudoers manual or the description of sudoCommand in the
  sudoers.ldap manual for details.
  * Fixed potential false positives in visudo's alias cycle detection.
  * Sudo now only builds Position Independent Executables (PIE) by default on Linux
  systems and verifies that a trivial test program builds and runs.

OBS-URL: https://build.opensuse.org/request/show/181790
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=56
2013-07-03 08:27:44 +00:00
83cffef23c OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=57 2013-07-02 16:37:53 +00:00
313affb53e * remove CVE-2013-1775
* remove CVE-2013-1776
  * The non-Unix group plugin is now supported when sudoers data is stored in LDAP.
  * User messages are now always displayed in the user's locale, even when the
  same message is being logged or mailed in a different locale.  
  * Log files created by sudo now explicitly have the group set to group ID 0
  rather than relying on BSD group semantics (which may not be the default).
  * A new exec_background sudoers option can be used to initially run the 
  command without read access to the terminal when running a command in a 
  pseudo-tty. 
  * Sudo now produces better error messages when there is an error in the sudo.conf file.
  * Two new settings have been added to sudo.conf to give the admin better control of 
  how group database queries are performed.
  * There is now a standalone sudo.conf manual page.
  * New support for specifying a SHA-2 digest along with the command in sudoers.
  Supported hash types are sha224, sha256, sha384 and sha512. See the description
  of Digest_Spec in the sudoers manual or the description of sudoCommand in the
  sudoers.ldap manual for details.
  * Fixed potential false positives in visudo's alias cycle detection.
  * Sudo now only builds Position Independent Executables (PIE) by default on Linux
  systems and verifies that a trivial test program builds and runs.

OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=56
2013-07-02 16:36:04 +00:00
8c93addd58 - restore accidentally dropped suse-specific patches
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=55
2013-07-02 16:30:47 +00:00
Stephan Kulow
5e4d59ada8 Accepting request 181328 from Base:System
Update to upstream release 1.8.7, obsoleted patches. (forwarded request 181200 from stroeder)

OBS-URL: https://build.opensuse.org/request/show/181328
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=55
2013-06-29 12:51:55 +00:00
07a0c03b9a Accepting request 181200 from home:stroeder:branches:Base:System
Update to upstream release 1.8.7, obsoleted patches.

OBS-URL: https://build.opensuse.org/request/show/181200
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=53
2013-06-28 12:03:03 +00:00
Stephan Kulow
04df74a6bc Accepting request 156978 from Base:System
- added two security fixes:
  * CVE-2013-1775 (bnc#806919)
    + sudo-1.8.6p3-CVE-2013-1775.patch
  * CVE-2013-1776 (bnc#806921)
    + sudo-1.8.6p3-CVE-2013-1776.patch (forwarded request 156969 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/156978
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=54
2013-03-01 19:45:08 +00:00
Vítězslav Čížek
c942c5ab82 Accepting request 156969 from home:vitezslav_cizek:branches:Base:System
- added two security fixes:
  * CVE-2013-1775 (bnc#806919)
    + sudo-1.8.6p3-CVE-2013-1775.patch
  * CVE-2013-1776 (bnc#806921)
    + sudo-1.8.6p3-CVE-2013-1776.patch

OBS-URL: https://build.opensuse.org/request/show/156969
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=51
2013-03-01 12:07:40 +00:00
Ismail Dönmez
65a75b053a Accepting request 143956 from Base:System
license update: ISC
Look at the license file (forwarded request 143855 from babelworx)

OBS-URL: https://build.opensuse.org/request/show/143956
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=52
2012-12-05 13:09:24 +00:00
f3304123f3 Accepting request 143855 from home:babelworx:ldig:branches:Base:System
license update: ISC
Look at the license file

OBS-URL: https://build.opensuse.org/request/show/143855
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=49
2012-12-03 14:39:41 +00:00
Stephan Kulow
535addf130 Accepting request 140161 from Base:System
- sudo 1.8.6p3
* Support for using the System Security Services Daemon (SSSD) as a source of sudoers data
* Fixed a race condition that could cause sudo to receive SIGTTOU (and stop) 
  when resuming a shell that was run via sudo when I/O logging (and use_pty) is not enabled. 
* The sudoers plugin now takes advantage of symbol visibility controls when supported by the compiler or linker.
* Sending SIGTSTP directly to the sudo process will now suspend 
   the running command when I/O logging (and use_pty) is not enabled. (forwarded request 140141 from elvigia)

OBS-URL: https://build.opensuse.org/request/show/140161
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=51
2012-11-05 14:03:05 +00:00
60747c3aa2 Accepting request 140141 from home:elvigia:branches:Base:System
- sudo 1.8.6p3
* Support for using the System Security Services Daemon (SSSD) as a source of sudoers data
* Fixed a race condition that could cause sudo to receive SIGTTOU (and stop) 
  when resuming a shell that was run via sudo when I/O logging (and use_pty) is not enabled. 
* The sudoers plugin now takes advantage of symbol visibility controls when supported by the compiler or linker.
* Sending SIGTSTP directly to the sudo process will now suspend 
   the running command when I/O logging (and use_pty) is not enabled.

OBS-URL: https://build.opensuse.org/request/show/140141
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=47
2012-11-05 08:15:29 +00:00
Stephan Kulow
d235511496 Accepting request 139473 from Base:System
- add explicit buildrequire on groff (forwarded request 139469 from coolo)

OBS-URL: https://build.opensuse.org/request/show/139473
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=50
2012-10-27 05:48:07 +00:00
Cristian Rodríguez
76896bfa49 Accepting request 139469 from home:coolo:branches:openSUSE:Factory
- add explicit buildrequire on groff

OBS-URL: https://build.opensuse.org/request/show/139469
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=45
2012-10-26 15:57:42 +00:00
Stephan Kulow
9cef9b95fb Accepting request 124895 from Base:System
Update to 1.8.5p2; we want this as it includes important fixes (forwarded request 124880 from vuntz)

OBS-URL: https://build.opensuse.org/request/show/124895
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=48
2012-06-18 15:35:22 +00:00
Robert Milasan
5dc96be976 Accepting request 124880 from home:vuntz:branches:Base:System
Update to 1.8.5p2; we want this as it includes important fixes

OBS-URL: https://build.opensuse.org/request/show/124880
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=43
2012-06-14 07:37:32 +00:00
Stephan Kulow
7caf0515eb Accepting request 121250 from Base:System
- update to 1.8.5
  Some of the changes:
  * /etc/environment is no longer read directly on Linux systems when
    PAM is used. Sudo now merges the PAM environment into the user's
    environment which is typically set by the pam_env module.
  * The plugin API has been extended
  * The policy plugin's init_session function is now called by the
    parent sudo process, not the child process that executes the command
    This allows the PAM session to be open and closed in the same process,
    which some PAM modules require.
  * A new group provider plugin, system_group, is included
  * Fixed a potential security issue in the matching of hosts against
    an IPv4 network specified in sudoers.The flaw may allow a user who
    is authorized to run commands on hosts belonging to one IPv4
    network to run commands on a different host (CVE-2012-2337) (forwarded request 121223 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/121250
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=47
2012-05-21 06:02:12 +00:00
5b4fbad316 Accepting request 121223 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.5
  Some of the changes:
  * /etc/environment is no longer read directly on Linux systems when
    PAM is used. Sudo now merges the PAM environment into the user's
    environment which is typically set by the pam_env module.
  * The plugin API has been extended
  * The policy plugin's init_session function is now called by the
    parent sudo process, not the child process that executes the command
    This allows the PAM session to be open and closed in the same process,
    which some PAM modules require.
  * A new group provider plugin, system_group, is included
  * Fixed a potential security issue in the matching of hosts against
    an IPv4 network specified in sudoers.The flaw may allow a user who
    is authorized to run commands on hosts belonging to one IPv4
    network to run commands on a different host (CVE-2012-2337)

OBS-URL: https://build.opensuse.org/request/show/121223
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=41
2012-05-16 21:13:33 +00:00
Stephan Kulow
8bde0fcc0b Accepting request 108650 from Base:System
- update to 1.8.4p2
  Some of the changes:
  * The -D flag in sudo has been replaced with a more general
    debugging framework that is configured in sudo.conf.
  * Fixed a crash with sudo -i when a runas group was specified
    without a runas user.
  * New Serbian and Spanish translations for sudo from translationproject.org.
    LDAP-based sudoers may now access by group ID in addition to group name.
  * visudo will now fix the mode on the sudoers file even if no
    changes are made unless the -f option is specified.
  * On systems that use login.conf, sudo -i now sets environment
    variables based on login.conf
  * values in the LDAP search expression are now escaped as per RFC 4515
  * The deprecated "noexec_file" sudoers option is no longer supported.
  * Fixed a race condition when I/O logging is not enabled that could
    result in tty-generated signals (e.g. control-C) being received
    by the command twice.
  * visudo -c will now list any include files that were checked in
    addition to the main sudoers file when everything parses OK.
  * Users that only have read-only access to the sudoers file may
    now run visudo -c. Previously, write permissions were required
    even though no writing is down in check-only mode.

OBS-URL: https://build.opensuse.org/request/show/108650
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=46
2012-03-09 20:28:11 +00:00
Vítězslav Čížek
8dd91c7580 Accepting request 108646 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.4p2
  Some of the changes:
  * The -D flag in sudo has been replaced with a more general
    debugging framework that is configured in sudo.conf.
  * Fixed a crash with sudo -i when a runas group was specified
    without a runas user.
  * New Serbian and Spanish translations for sudo from translationproject.org.
    LDAP-based sudoers may now access by group ID in addition to group name.
  * visudo will now fix the mode on the sudoers file even if no
    changes are made unless the -f option is specified.
  * On systems that use login.conf, sudo -i now sets environment
    variables based on login.conf
  * values in the LDAP search expression are now escaped as per RFC 4515
  * The deprecated "noexec_file" sudoers option is no longer supported.
  * Fixed a race condition when I/O logging is not enabled that could
    result in tty-generated signals (e.g. control-C) being received
    by the command twice.
  * visudo -c will now list any include files that were checked in
    addition to the main sudoers file when everything parses OK.
  * Users that only have read-only access to the sudoers file may
    now run visudo -c. Previously, write permissions were required
    even though no writing is down in check-only mode.

OBS-URL: https://build.opensuse.org/request/show/108646
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=39
2012-03-09 15:02:22 +00:00
Stephan Kulow
9e2f1dc794 Accepting request 102196 from Base:System
- update to 1.8.3p2
  * Fixed a format string vulnerability when the sudo binary
    (or a symbolic link to the sudo binary) contains printf
    format escapes and the -D (debugging) flag is used.

OBS-URL: https://build.opensuse.org/request/show/102196
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=45
2012-02-01 12:17:30 +00:00
Vítězslav Čížek
a4db0dcc17 Accepting request 102195 from home:vitezslav_cizek:branches:Base:System
- update to 1.8.3p2
  * Fixed a format string vulnerability when the sudo binary
    (or a symbolic link to the sudo binary) contains printf
    format escapes and the -D (debugging) flag is used.

OBS-URL: https://build.opensuse.org/request/show/102195
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=37
2012-01-31 12:34:31 +00:00
Stephan Kulow
2b7a499855 Accepting request 101544 from Base:System
- honour global CFLAGS and LDFLAGS when compiling sesh,
  to avoid rpmlint error (bnc#743157) (forwarded request 101520 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/101544
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=44
2012-01-26 15:00:37 +00:00
Cristian Rodríguez
dc65d7161e Accepting request 101520 from home:vitezslav_cizek:branches:Base:System
- honour global CFLAGS and LDFLAGS when compiling sesh,
  to avoid rpmlint error (bnc#743157)

OBS-URL: https://build.opensuse.org/request/show/101520
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=34
2012-01-25 17:06:41 +00:00
Vítězslav Čížek
f3f2cd6ff6 Accepting request 98778 from home:vitezslav_cizek:branches:Base:System
- update to sudo-1.8.3p1 
  * Fixed a crash in the monitor process on Solaris when NOPASSWD
    was specified or when authentication was disabled.
  * Fixed matching of a Runas_Alias in the group section of a Runas_Spec.

OBS-URL: https://build.opensuse.org/request/show/98778
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=33
2012-01-04 17:06:35 +00:00
Stephan Kulow
defc984e51 Accepting request 98380 from Base:System
Set timedir correctly (forwarded request 98341 from a_jaeger)

OBS-URL: https://build.opensuse.org/request/show/98380
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=43
2011-12-31 16:20:23 +00:00
Cristian Rodríguez
7a585a77e0 Accepting request 98341 from home:a_jaeger:FactoryFix
Set timedir correctly

OBS-URL: https://build.opensuse.org/request/show/98341
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=31
2011-12-28 19:07:41 +00:00
Stephan Kulow
89ae018d7d replace license with spdx.org variant
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=42
2011-12-06 18:06:13 +00:00
OBS User buildservice-autocommit
8f7438464a Updating link to change in openSUSE:Factory/sudo revision 42.0
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=2fa981306c6e78f09986e35850ef107a
2011-12-06 18:06:13 +00:00
Stephan Kulow
ebf9822650 Accepting request 89911 from Base:System
- update to sudo-1.8.3
  - Fixed expansion of strftime() escape sequences
    in the log_dir sudoers setting.
  - Esperanto, Italian and Japanese
    translations from translationproject.org.
  - Added --enable-werror configure option for gcc's
  -Werror flag.  - Visudo no longer
    assumes all editors support the +linenumber command line argument.
    It now uses a whitelist of editors known to support the option.
  - Fixed matching of network addresses when a netmask is specified but
    the address is not the first one in the CIDR block.
  - The configure script now check whether or not errno.h declares the
    errno variable. Previously, sudo would always declare errno itself
    for older systems that don't declare it in errno.h.
  - The NOPASSWD tag is now honored for denied commands too,
    which matches historic sudo behavior (prior to sudo 1.7.0).
  - Sudo now honors the DEREF
    setting in ldap.conf which controls how alias dereferencing is done
    during an LDAP search.
  - A symbol conflict with the
    pam_ssh_agent_auth PAM module that would cause a crash been
    resolved.
  - The inability to load a group provider plugin is no
    longer a fatal error.
  - A potential crash in the utmp handling
    code has been fixed.
  - Two PAM session issues have been resolved.
    In previous versions of sudo, the PAM session was opened as one
    user and closed as another. Additionally, if no authentication was
    performed, the PAM session would never be closed.

OBS-URL: https://build.opensuse.org/request/show/89911
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=41
2011-11-02 11:18:43 +00:00
Vítězslav Čížek
64c643111a - remove old tarball
- sudo-grp-include.patch no longer needed

OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=28
2011-10-24 12:08:46 +00:00
Vítězslav Čížek
b2c6f045a9 Accepting request 89134 from home:vitezslav_cizek:branches:Base:System
- update to sudo-1.8.3
  - Fixed expansion of strftime() escape sequences
    in the log_dir sudoers setting.
  - Esperanto, Italian and Japanese
    translations from translationproject.org.
  - Added --enable-werror configure option for gcc's
  -Werror flag.  - Visudo no longer
    assumes all editors support the +linenumber command line argument.
    It now uses a whitelist of editors known to support the option.
  - Fixed matching of network addresses when a netmask is specified but
    the address is not the first one in the CIDR block.
  - The configure script now check whether or not errno.h declares the
    errno variable. Previously, sudo would always declare errno itself
    for older systems that don't declare it in errno.h.
  - The NOPASSWD tag is now honored for denied commands too,
    which matches historic sudo behavior (prior to sudo 1.7.0).
  - Sudo now honors the DEREF
    setting in ldap.conf which controls how alias dereferencing is done
    during an LDAP search.
  - A symbol conflict with the
    pam_ssh_agent_auth PAM module that would cause a crash been
    resolved.
  - The inability to load a group provider plugin is no
    longer a fatal error.
  - A potential crash in the utmp handling
    code has been fixed.
  - Two PAM session issues have been resolved.
    In previous versions of sudo, the PAM session was opened as one
    user and closed as another. Additionally, if no authentication was
    performed, the PAM session would never be closed.

OBS-URL: https://build.opensuse.org/request/show/89134
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=27
2011-10-24 11:08:52 +00:00
Lars Vogdt
20338eda89 Accepting request 87713 from Base:System
- updated to sudo-1.8.2
  * Sudo, visudo, sudoreplay and the sudoers plug-in now have natural
    language support (NLS). This can be disabled by passing configure
    the --disable-nls option.  Sudo will use gettext(), if available,
    to display translated messages.  All translations are coordinated
    via The Translation Project, http://translationproject.org/.
  * Plug-ins are now loaded with the RTLD_GLOBAL flag instead of
    RTLD_LOCAL.  This fixes missing symbol problems in PAM modules
    on certain platforms, such as FreeBSD and SuSE Linux Enterprise.
  * I/O logging is now supported for commands run in background mode
    (using sudo's -b flag).
  * Group ownership of the sudoers file is now only enforced when
    the file mode on sudoers allows group readability or writability.
  * Visudo now checks the contents of an alias and warns about cycles
    when the alias is expanded.
  * If the user specifes a group via sudo's -g option that matches
    the target user's group in the password database, it is now
    allowed even if no groups are present in the Runas_Spec.
  * The sudo Makefiles now have more complete dependencies which are
    automatically generated instead of being maintained manually.
  * The "use_pty" sudoers option is now correctly passed back to the
    sudo front end.  This was missing in previous versions of sudo
    1.8 which prevented "use_pty" from being honored.
  * "sudo -i command" now works correctly with the bash version
    2.0 and higher.  Previously, the .bash_profile would not be
    sourced prior to running the command unless bash was built with
    NON_INTERACTIVE_LOGIN_SHELLS defined.
  * When matching groups in the sudoers file, sudo will now match
    based on the name of the group instead of the group ID. This can
    substantially reduce the number of group lookups for sudoers

OBS-URL: https://build.opensuse.org/request/show/87713
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=39
2011-10-13 15:24:51 +00:00
Vítězslav Čížek
371ec6d550 Accepting request 87600 from home:prusnak:branches:Base:System
- updated to sudo-1.8.2
- please forward to factory

OBS-URL: https://build.opensuse.org/request/show/87600
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=25
2011-10-13 13:29:20 +00:00
Sascha Peilicke
00b9a480c9 Autobuild autoformatter for 70788
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=38
2011-05-23 08:15:21 +00:00
OBS User buildservice-autocommit
876cdb5b2b Updating link to change in openSUSE:Factory/sudo revision 38.0
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=b8cd76a5eddf882d561e3cb35cccc86f
2011-05-23 08:15:21 +00:00
Sascha Peilicke
56cee3fd8c Accepting request 70788 from Base:System
update to 1.8.1p2

OBS-URL: https://build.opensuse.org/request/show/70788
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=37
2011-05-23 08:15:12 +00:00
f18a604ee0 update to 1.8.1p2
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=22
2011-05-20 12:20:15 +00:00
Sascha Peilicke
041f9c99c7 Autobuild autoformatter for 64995
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=36
2011-03-24 08:42:44 +00:00
OBS User buildservice-autocommit
d41b53ae2d Updating link to change in openSUSE:Factory/sudo revision 36.0
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=efbbada7abb90adbb529567e447f2b9c
2011-03-24 08:42:44 +00:00
Sascha Peilicke
344bf7570f Accepting request 64995 from Base:System
Accepted submit request 64995 from user coolo

OBS-URL: https://build.opensuse.org/request/show/64995
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=35
2011-03-24 08:42:35 +00:00
af665bed11 Accepting request 64993 from home:puzel:staging
OBS-URL: https://build.opensuse.org/request/show/64993
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=20
2011-03-23 12:45:03 +00:00
Ruediger Oertel
5a84482fc5 Autobuild autoformatter for 59319
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=33
2011-02-02 00:36:33 +00:00
Ruediger Oertel
0855073113 Accepting request 59319 from Base:System
Accepted submit request 59319 from user puzel

OBS-URL: https://build.opensuse.org/request/show/59319
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=32
2011-02-02 00:36:22 +00:00
89efcc0d2c bnc#667558, bnc#663881
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=18
2011-01-28 11:22:22 +00:00
OBS User autobuild
f1cbda6421 Accepting request 44242 from Base:System
Copy from Base:System/sudo based on submit request 44242 from user coolo

OBS-URL: https://build.opensuse.org/request/show/44242
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=31
2010-07-30 13:55:28 +00:00
OBS User buildservice-autocommit
1d242cbebb Updating link to change in openSUSE:Factory/sudo revision 31.0
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=a506db91f329c9c24c65bcc4b0f4ddab
2010-07-30 13:55:28 +00:00
OBS User autobuild
6733f8405c Accepting request 44242 from Base:System
checked in (request 44242)

OBS-URL: https://build.opensuse.org/request/show/44242
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=16
2010-07-30 13:55:26 +00:00
Stephan Kulow
f06fd25497 Accepting request 42167 from home:jengelh:smp
Copy from home:jengelh:smp/sudo via accept of submit request 42167 revision 2.
Request was accepted with message:
Reviewed ok

OBS-URL: https://build.opensuse.org/request/show/42167
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=15
2010-06-28 21:22:50 +00:00
OBS User autobuild
d5a69a9c43 Accepting request 41584 from Base:System
Copy from Base:System/sudo based on submit request 41584 from user puzel

OBS-URL: https://build.opensuse.org/request/show/41584
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=28
2010-06-22 08:38:23 +00:00
OBS User autobuild
c02c3ca0b7 Accepting request 41584 from Base:System
checked in (request 41584)

OBS-URL: https://build.opensuse.org/request/show/41584
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=14
2010-06-22 08:38:23 +00:00
Philipp Thomas
1e92e556a4 Accepting request 41518 from home:pbleser:branches:Base:System
Copy from home:pbleser:branches:Base:System/sudo via accept of submit request 41518 revision 2.
Request was accepted with message:
reviewed ok.

OBS-URL: https://build.opensuse.org/request/show/41518
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=13
2010-06-16 09:14:28 +00:00
OBS User autobuild
cbb9e77c58 Accepting request 40990 from Base:System
Copy from Base:System/sudo based on submit request 40990 from user puzel

OBS-URL: https://build.opensuse.org/request/show/40990
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=27
2010-06-02 16:12:04 +00:00
OBS User buildservice-autocommit
104c5fc11b Updating link to change in openSUSE:Factory/sudo revision 27.0
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=fdd61363b4ef456a4506691a09e6283e
2010-06-02 16:12:04 +00:00
OBS User autobuild
f9207a7cdd Accepting request 40990 from Base:System
checked in (request 40990)

OBS-URL: https://build.opensuse.org/request/show/40990
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=12
2010-06-02 16:12:03 +00:00
aeeae9962d bnc#594738
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=11
2010-06-02 12:31:24 +00:00
OBS User autobuild
c694f07909 Accepting request 40277 from Base:System
Copy from Base:System/sudo based on submit request 40277 from user puzel

OBS-URL: https://build.opensuse.org/request/show/40277
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=26
2010-05-25 11:25:42 +00:00
OBS User buildservice-autocommit
ebe3884aa7 Updating link to change in openSUSE:Factory/sudo revision 26.0
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=762302b9eca24013cbda733513da20e3
2010-05-25 11:25:42 +00:00
OBS User autobuild
d5b94ade1b Accepting request 40277 from Base:System
checked in (request 40277)

OBS-URL: https://build.opensuse.org/request/show/40277
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=10
2010-05-25 11:25:41 +00:00
5afda44d49 bnc#594738
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=9
2010-05-18 15:52:50 +00:00
OBS User autobuild
8d4a5dcf80 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=25 2010-03-18 15:30:48 +00:00
OBS User autobuild
983ba54b5c Accepting request 33397 from Base:System
Copy from Base:System/sudo based on submit request 33397 from user prusnak

OBS-URL: https://build.opensuse.org/request/show/33397
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=24
2010-02-25 01:34:39 +00:00
OBS User autobuild
d726d9c64b Accepting request 33397 from Base:System
checked in (request 33397)

OBS-URL: https://build.opensuse.org/request/show/33397
OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=8
2010-02-25 01:34:38 +00:00
Pavol Rusnak
f256dfb750 - updated to 1.7.2p4
* Fixed the expansion of the %h escape in #include file names
    introduced in sudo 1.7.1.
  * Fixed a a bug where the negation operator in a Cmnd_List
    was not being honored.
  * No longer produce a parse error when #includedir references
    a directory that contains no valid filenames.
  * The sudo.man.pl and sudoers.man.pl files are now included
    in the distribution for people who wish to regenerate the man pages.
  * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos.
  * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early
    so they can be used during authentication.
  * Fix printing of entries with multiple host entries on
    a single line.
  * Fix use after free when sending error messages via email.
  * Use setrlimit64(), if available, instead of setrlimit()
    when setting AIX resource limits since rlim_t is 32bits.
  * Fix size arg when realloc()ing include stack.
  * Avoid a duplicate fclose() of the sudoers file.
  * Fix a bug that could allow users with permission to run sudoedit
    to run arbitrary commands.

OBS-URL: https://build.opensuse.org/package/show/Base:System/sudo?expand=0&rev=7
2010-02-24 16:24:47 +00:00
OBS User autobuild
ad1a4319ea Accepting request 32317 from Base:System
Copy from Base:System/sudo based on submit request 32317 from user coolo

OBS-URL: https://build.opensuse.org/request/show/32317
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=23
2010-02-11 18:37:57 +00:00
OBS User unknown
c6828a9cf8 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=21 2009-07-16 14:55:46 +00:00
OBS User unknown
3544e68c00 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=20 2009-04-27 20:11:38 +00:00
OBS User unknown
ad1e2def27 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=19 2009-01-27 01:25:55 +00:00
OBS User unknown
c9351a3cb8 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=18 2008-08-22 20:03:52 +00:00
OBS User unknown
b232a2dbd6 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=17 2008-08-07 10:00:06 +00:00
OBS User unknown
96574f9ebd OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=16 2008-05-06 22:15:06 +00:00
OBS User unknown
fae157235e OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=15 2008-04-25 14:46:55 +00:00
OBS User unknown
39baf0550d OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=14 2008-03-21 03:40:40 +00:00
OBS User unknown
a4a82963ae OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=13 2007-12-06 00:36:36 +00:00
OBS User unknown
da08cb1ab2 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=12 2007-11-06 22:24:53 +00:00
OBS User unknown
8a9fb54920 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=11 2007-10-30 11:29:53 +00:00
OBS User unknown
e55427ece7 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=10 2007-10-10 10:10:42 +00:00
OBS User unknown
ef4d6a4712 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=9 2007-10-04 01:12:16 +00:00
OBS User unknown
a0fd879071 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=8 2007-08-29 20:45:09 +00:00
OBS User unknown
a95e6b9f9a OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=7 2007-08-15 18:37:18 +00:00
OBS User unknown
88c660518c OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=6 2007-08-12 09:46:56 +00:00
OBS User unknown
16b0f4feab OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=5 2007-08-03 21:18:41 +00:00
OBS User unknown
ed8f0c39c6 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=4 2007-07-27 00:11:20 +00:00
OBS User unknown
f96ded015c OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=3 2007-07-18 21:01:14 +00:00
OBS User unknown
3d8787a0c2 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=2 2007-01-26 22:12:53 +00:00
OBS User unknown
2623be693e OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=1 2007-01-15 23:38:14 +00:00
7 changed files with 187 additions and 24 deletions

Binary file not shown.

Binary file not shown.

3
sudo-1.9.17p2.tar.gz Normal file
View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:4a38a1ab3adb1199257edc2a7c4a2bd714665eb605b04368843b06dada2cfcfb
size 5451682

BIN
sudo-1.9.17p2.tar.gz.sig Normal file

Binary file not shown.

View File

@@ -1,10 +1,10 @@
Index: sudo-1.9.15p2/plugins/sudoers/sudoers.in
Index: sudo-1.9.17p1/plugins/sudoers/sudoers.in
===================================================================
--- sudo-1.9.15p2.orig/plugins/sudoers/sudoers.in
+++ sudo-1.9.15p2/plugins/sudoers/sudoers.in
@@ -41,32 +41,23 @@
##
## Defaults specification
--- sudo-1.9.17p1.orig/plugins/sudoers/sudoers.in
+++ sudo-1.9.17p1/plugins/sudoers/sudoers.in
@@ -50,29 +50,23 @@ Defaults!@visudo@ env_keep += "SUDO_EDIT
## arbitrary commands under sudo.
@secure_path_config@Defaults secure_path="@secure_path@"
##
-## You may wish to keep some of the following environment variables
-## when running commands via sudo.
@@ -29,9 +29,6 @@ Index: sudo-1.9.15p2/plugins/sudoers/sudoers.in
-## Uncomment to enable special input methods. Care should be taken as
-## this may allow users to subvert the command being run via sudo.
-# Defaults env_keep += "XMODIFIERS GTK_IM_MODULE QT_IM_MODULE QT_IM_SWITCHER"
-##
-## Uncomment to use a hard-coded PATH instead of the user's to find commands
-# Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
+## Prevent environment variables from influencing programs in an
+## unexpected or harmful way (CVE-2005-2959, CVE-2005-4158, CVE-2006-0151)
+Defaults always_set_home
@@ -50,9 +47,9 @@ Index: sudo-1.9.15p2/plugins/sudoers/sudoers.in
+## Use this PATH instead of the user's to find commands.
+Defaults secure_path="/usr/sbin:/usr/bin:/sbin:/bin"
##
## Uncomment to restore the historic behavior where a command is run in
## the user's own terminal.
@@ -81,7 +72,6 @@
## Uncomment to disable "use_pty" when running commands as root.
## Commands run as non-root users will run in a pseudo-terminal,
@@ -94,7 +88,6 @@ Defaults!@visudo@ env_keep += "SUDO_EDIT
## Set maxseq to a smaller number if you don't have unlimited disk space.
# Defaults log_output
# Defaults!/usr/bin/sudoreplay !log_output
@@ -60,9 +57,9 @@ Index: sudo-1.9.15p2/plugins/sudoers/sudoers.in
# Defaults!REBOOT !log_output
# Defaults maxseq = 1000
##
@@ -95,6 +85,12 @@
## slower by these options and also can clutter up the logs.
# Defaults!PKGMAN !intercept, !log_subcmds
@@ -112,6 +105,12 @@ Defaults!@visudo@ env_keep += "SUDO_EDIT
## modules such as pam_faillock will not be printed.
# Defaults !pam_silent
+## In the default (unconfigured) configuration, sudo asks for the root password.
+## This allows use of an ordinary user account for administration of a freshly
@@ -73,12 +70,12 @@ Index: sudo-1.9.15p2/plugins/sudoers/sudoers.in
##
## Runas alias specification
##
@@ -110,13 +106,5 @@ root ALL=(ALL:ALL) ALL
@@ -127,13 +126,5 @@ root ALL=(ALL:ALL) ALL
## Same thing without a password
# %wheel ALL=(ALL:ALL) NOPASSWD: ALL
-## Uncomment to allow members of group sudo to execute any command
-# %sudo ALL=(ALL:ALL) ALL
-# %sudo ALL=(ALL:ALL) ALL
-
-## Uncomment to allow any user to run sudo if they know the password
-## of the user they are running the command as (root by default).

View File

@@ -1,3 +1,165 @@
-------------------------------------------------------------------
Mon Sep 15 11:25:24 UTC 2025 - Simon Lees <sflees@suse.de>
- Update to 1.9.17p2
* Fixed a bug introduced in sudo 1.9.16 that could result in sudo
sending SIGHUP to all processes on the system in certain rare
cases. The bug could manifest if sudo is running a command in
a pseudo-terminal, sudo terminates the command due to an
internal error, and the users terminal is revoked. GitHub
issue #458.
* Fixed a bug introduced in sudo 1.9.12 that caused sudo to
abort when the intercept and intercept_verify options are
enabled in sudoers and either the command line arguments or
the environment contains a string larger than the page size
(usually 4096). This only Linux affects systems that support
the ptrace_readv_string() function. GitHub issue #453.
* Fixed a bug in sudos configure script introduced in sudo
1.9.17 that prevented mdoc-format man pages from being used
on systems without the mandoc utility. Bug #1077.
- /usr/etc/sudoers and file /usr/etc/sudoers.d/50-wheel-auth-self
both have permissions 0644, while visudo -c complains that they
should be 0440. (bsc#1249447)
- Policy and Groups subpackages can be noarch
-------------------------------------------------------------------
Mon Jun 30 19:28:17 UTC 2025 - Simon Lees <sflees@suse.de>
- Update to 1.9.17p1
* Fix a possible local privilege escalation via the --host option
[bsc#1245274, CVE-2025-32462]
* Fix a possible local privilege Escalation via chroot option
[bsc#1245275, CVE-2025-32463]
- Update to 1.9.17
* Sudo now uses the NODEV macro consistently. Bug #1074.
Fixed a bug where the ALL command in a sudoers rule would
override a previous NOSETENV tag. Command tags are inherited from
previous Cmnds in a Cmnd_Spec_List. There is a special case for
the SETENV tag with the ALL command, where SETENV is implied if
no explicit SETENV or NOSETENV tag is specified. This special
case did not take into account that a NOSETENV tag that was inherited
should override this behavior.
* If sudo is run via ssh without a terminal and a password is required,
it now suggest using sshs -t option.
* Fixed the display of timeout values in the sudo -V output on systems
without a C99-compliant snprintf() function.
* Quieted a number of minor Coverity warnings.
* Fixed a problem running sudo from a serial console on Linux when the
command is run in a pseudo-terminal (the default).
* Fixed a crash in sudo which could occur if there was a fatal error
after the user was validated but before the command was actually run.
* Fixed a number of man page style warnings. The “lint” make target in
the docs directory will now run groff with warnings enabled if it is
available. Bug #1075.
* The ignore_dot sudoers setting is now on by default. There is now a
--disable-ignore-dot configure option to disable it. The
--with-ignore-dot configure option has been deprecated.
* Fixed a problem with the pwfeedback option where an initial backspace
would reduce the maximum length allowed for the password.
GitHub issue #439.
* Fixed minor grammar and spelling problems in the man pages.
* Fixed a bug where a user could avoid entering a password for sudo -l
command if they specified their own user or group name via the -u or
-g options.
* Avoid potential password guessing based on timing attacks on the
strcmp() function on systems without PAM or a crypt() function where
plaintext passwords are stored in the shadow password file.
* Fixed a potential information leak where sudo -l command could be used
to determine whether an executable exists in a directory that they do
not have search access to.
* Sudo uses TCSAFLUSH, not TCSADRAIN, when disabling echo once again.
A long time ago sudo changed from using TCSAFLUSH to TCSADRAIN due
to some systems having bugs related to TCSAFLUSH. That should no longer
be a concern. Using TCSAFLUSH ensures that password input that has been
received by the kernel, but not yet read by sudo, will be discarded and
not echoed.
* Added the SUDO_TTY environment variable if the user has a terminal.
This can be used to find the users original tty device when sudo runs
the command in its own pseudo-terminal. GitHub issue #447.
* New Cantonese translation for sudo.
-------------------------------------------------------------------
Wed Apr 16 07:05:52 UTC 2025 - Simon Lees <sflees@suse.de>
- Update to 1.9.16p2:
* Sudo now passes the terminal device number to the policy plugin
even if it cannot resolve it to a path name. This allows sudo to
run without warnings in a chroot jail when the terminal device
files are not present. GitHub issue #421.
* On Linux systems, sudo will now attempt to use the symbolic links
in /proc/self/fd/{0,1,2} when resolving the terminal device number.
This can allow sudo to map a terminal device to its path name even
when /dev/pts is not mounted in a chroot jail.
* Fixed compilation errors with gcc and clang in C23 mode. C23 no
longer supports functions with unspecified arguments. GitHub issue
#420.
* Fixed the test for cross-compiling when checking for C99 snprintf().
The changes made to the test in sudo 1.9.16 resulted in a different
problem. GitHub issue #386.
* Fixed the date used by the exit record in sudo-format log files.
This was a regression introduced in sudo 1.9.16 and only affected
file-based logs, not syslog. GitHub issue #405.
* Fixed the root cause of the “unable to find terminal name for device”
message when running sudo on AIX when no terminal is present. In
sudo 1.9.16 this was turned from a debug message into a warning.
GitHub issue #408.
* When a duplicate alias is found in the sudoers file, the warning
message now includes the file and line number of the previous
definition.
* Added support for the --with-secure-path-value=no configure option
to allow packagers to ship the default sudoers file with the secure
path line commented out.
* Sudo no longer sends mail when a user runs sudo -nv or sudo -nl,
even if mail_badpass or mail_always are set. Sudo already avoids
logging to a file or syslog in this case. Bug #1072.
* Added the cmddenial_message sudoers option to provide additional
information to the user when a command is denied by the sudoers
policy. The default message is still displayed.
* The time stamp used for file-based logs is now more consistent
with the time stamp produced by syslog. GitHub issue #327.
* Sudo will now warn the user if it can detect the users terminal but
cannot determine the path to the terminal device. The sudoers time
stamp file will now use the terminal device number directly.
GitHub issue #329.
* The embedded copy of zlib has been updated to version 1.3.1.
* Improved error handling if generating the list of signals and signal
names fails at build time.
* Fixed a compilation issue on Linux systems without process_vm_readv().
* Fixed cross-compilation with WolfSSL.
* Added a json_compact value for the sudoers log_format option which can
be used when logging to a file. The existing json value has been aliased
to json_pretty. In a future release, json will be an alias for
json_compact. GitHub issue #357.
* A new pam_silent sudoers option has been added which may be negated to
avoid suppressing output from PAM authentication modules. GitHub issue #216.
* Fixed several cvtsudoers JSON output problems. GitHub issues #369, #370,
#371, #373, #381.
* When sudo runs a command in a pseudo-terminal and the users terminal is
revoked, the pseudo-terminals foreground process group will now receive
SIGHUP before the terminal is revoked. This emulates the behavior of the
session leader exiting and is consistent with what happens when,
for example, an ssh session is closed. GitHub issue #367.
* Fixed make test with Python 3.12. GitHub issue #374.
* In schema.ActiveDirectory, fixed the quoting in the example command.
GitHub issue #376.
* Paths specified via a Chdir_Spec or Chroot_Spec in sudoers may now
be double-quoted.
* Sudo insults are now included by default, but disabled unless the
--with-insults configure option is specified or the insults sudoers
option is enabled.
* The default sudoers file now enables the secure_path option by
default and preserves the EDITOR, VISUAL, and SUDO_EDITOR environment
variables when running visudo. The new --with-secure-path-value
configure option can be used to set the value of secure_path in
the default sudoers file. GitHub issue #387.
* A sudoers schema for IBM Directory Server (aka IBM Tivoli Directory
Server, IBM Security Directory Server, and IBM Security Verify
Directory) is now included.
* When cross-compiling sudo, the configure script now assumes that
the snprintf() function is C99-compliant if the C compiler
supports the C99 standard. Previously, configure would use sudos
own snprintf() when cross-compiling. GitHub issue #386.
-------------------------------------------------------------------
Mon Jul 29 04:55:32 UTC 2024 - Simon Lees <sflees@suse.de>

View File

@@ -1,7 +1,7 @@
#
# spec file for package sudo
#
# Copyright (c) 2024 SUSE LLC
# Copyright (c) 2025 SUSE LLC and contributors
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -25,7 +25,7 @@
%endif
Name: sudo
Version: 1.9.15p5
Version: 1.9.17p2
Release: 0
Summary: Execute some commands as root
License: ISC
@@ -104,6 +104,7 @@ Summary: Users in the wheel group can authenticate as admin
Group: System/Base
Requires: %{name} = %{version}
Requires: group(wheel)
BuildArch: noarch
%description policy-wheel-auth-self
Sudo authentication policy that allows users in the wheel group to
@@ -114,6 +115,7 @@ Summary: Users in the sudo group can authenticate as admin
Group: System/Base
Requires: %{name} = %{version}
Requires: group(sudo)
BuildArch: noarch
%description policy-sudo-auth-self
Sudo authentication policy that allows users in the sudo group to
@@ -122,6 +124,7 @@ authenticate as root with their own password
%package -n system-group-sudo
Summary: System group 'sudo'
Group: System/Fhs
BuildArch: noarch
%{sysusers_requires}
%description -n system-group-sudo
@@ -205,9 +208,10 @@ rm -f %{buildroot}%{confdir}/sudoers.dist
mkdir -p %{buildroot}%{_distconfdir}/sudoers.d %{buildroot}%{_sysconfdir}/sudoers.d
chmod 644 %{buildroot}%{_distconfdir}/sudoers
echo "@includedir /etc/sudoers.d" >> %{buildroot}%{_distconfdir}/sudoers
chmod 440 %{buildroot}%{_distconfdir}/sudoers
%endif
install -D -m 644 %{SOURCE8} %{buildroot}%{confdir}/sudoers.d/50-wheel-auth-self
install -D -m 440 %{SOURCE8} %{buildroot}%{confdir}/sudoers.d/50-wheel-auth-self
install -D -m 644 %{SOURCE9} %{buildroot}/usr/share/polkit-1/rules.d/51-wheel.rules
sed -e 's/wheel/sudo/g' < %{SOURCE8} > %{buildroot}%{confdir}/sudoers.d/50-sudo-auth-self
@@ -323,7 +327,7 @@ test -f %{_sysconfdir}/sudoers.rpmsave && mv -v %{_sysconfdir}/sudoers.rpmsave %
%{_localstatedir}/lib/tests
%files policy-wheel-auth-self
%{confdir}/sudoers.d/50-wheel-auth-self
%attr(0440,root,root) %{confdir}/sudoers.d/50-wheel-auth-self
%dir /usr/share/polkit-1
%dir %attr(0555,root,root) /usr/share/polkit-1/rules.d
/usr/share/polkit-1/rules.d/51-wheel.rules