pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/security/sudo security/sudo: update to 1.8.31p2
details: https://anonhg.NetBSD.org/pkgsrc/rev/d8630422798a
branches: trunk
changeset: 439402:d8630422798a
user: taca <taca%pkgsrc.org@localhost>
date: Sat Sep 19 14:04:29 2020 +0000
description:
security/sudo: update to 1.8.31p2
Update sudo package to 1.8.31p2.
What's new in Sudo 1.8.31p2
* Sudo command line options that take a value may only be specified
once. This is to help guard against problems caused by poorly
written scripts that invoke sudo with user-controlled input.
Bug #924.
* When running a command in a pty, sudo will no longer try to
suspend itself if the user's tty has been revoked (for instance
when the parent ssh daemon is killed). This fixes a bug where
sudo would continuously suspend the command (which would succeed),
then suspend itself (which would fail due to the missing tty)
and then resume the command.
* If sudo's event loop fails due to the tty being revoked, remove
the user's tty events and restart the event loop (once). This
fixes a problem when running "sudo reboot" in a pty on some
systems. When the event loop exited unexpectedly, sudo would
kill the command running in the pty, which in the case of "reboot",
could lead to the system being in a half-rebooted state.
* Fixed a regression introduced in sudo 1.8.23 in the LDAP and
SSSD back-ends where a missing sudoHost attribute was treated
as an "ALL" wildcard value. A sudoRole with no sudoHost attribute
is now ignored as it was prior to version 1.8.23.
diffstat:
security/sudo/Makefile | 4 ++--
security/sudo/distinfo | 12 ++++++------
security/sudo/patches/patch-configure | 28 ++++++++++++++--------------
3 files changed, 22 insertions(+), 22 deletions(-)
diffs (137 lines):
diff -r 9f42f4c52d73 -r d8630422798a security/sudo/Makefile
--- a/security/sudo/Makefile Sat Sep 19 14:02:31 2020 +0000
+++ b/security/sudo/Makefile Sat Sep 19 14:04:29 2020 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.179 2020/04/28 05:29:18 taca Exp $
+# $NetBSD: Makefile,v 1.180 2020/09/19 14:04:29 taca Exp $
-DISTNAME= sudo-1.8.31p1
+DISTNAME= sudo-1.8.31p2
CATEGORIES= security
MASTER_SITES= https://www.sudo.ws/dist/
MASTER_SITES+= ftp://ftp.sudo.ws/pub/sudo/
diff -r 9f42f4c52d73 -r d8630422798a security/sudo/distinfo
--- a/security/sudo/distinfo Sat Sep 19 14:02:31 2020 +0000
+++ b/security/sudo/distinfo Sat Sep 19 14:04:29 2020 +0000
@@ -1,10 +1,10 @@
-$NetBSD: distinfo,v 1.110 2020/04/28 05:29:18 taca Exp $
+$NetBSD: distinfo,v 1.111 2020/09/19 14:04:29 taca Exp $
-SHA1 (sudo-1.8.31p1.tar.gz) = b959be78c815e37d893c5c481975b9793f9ed227
-RMD160 (sudo-1.8.31p1.tar.gz) = ace03e181e4240fde407f5353b363f28a72900c1
-SHA512 (sudo-1.8.31p1.tar.gz) = 9344fd1d8a8445e8afb9c5628cdc832fe32ea29199f071f35fb6ec694371801556df560f4382afec199f468b1f3264ad5e3a89e964612e571b8d911f823724cc
-Size (sudo-1.8.31p1.tar.gz) = 3351312 bytes
+SHA1 (sudo-1.8.31p2.tar.gz) = 53a6dfa90f78bc10615b83b7026bf3ba206c69e9
+RMD160 (sudo-1.8.31p2.tar.gz) = 5ffd8e785095c19c26ad8e3b3d5768669951f777
+SHA512 (sudo-1.8.31p2.tar.gz) = ad1bbbde74d3ab6e947071c6f21e436ebabcf5af11ecc75cde8f0c01ca0b8c6ae1cce2ff42f21612816c636e96722a2a14daa57757644ceab6577091f82242be
+Size (sudo-1.8.31p2.tar.gz) = 3353538 bytes
SHA1 (patch-Makefile.in) = e8813e1aa208d9ef6304038328504a5402341560
-SHA1 (patch-configure) = 906a90a8e8f5397693d9f410b7715439cf029508
+SHA1 (patch-configure) = 498b1040fceb317c239d050b59b3d1a180598441
SHA1 (patch-plugins_sudoers_Makefile.in) = 730193c6437197a7114dd31886050cecdcba6772
SHA1 (patch-src_Makefile.in) = 8959049bc428f592f84de1cad1a898c07c6e6b39
diff -r 9f42f4c52d73 -r d8630422798a security/sudo/patches/patch-configure
--- a/security/sudo/patches/patch-configure Sat Sep 19 14:02:31 2020 +0000
+++ b/security/sudo/patches/patch-configure Sat Sep 19 14:04:29 2020 +0000
@@ -1,4 +1,4 @@
-$NetBSD: patch-configure,v 1.2 2019/12/28 20:43:56 kim Exp $
+$NetBSD: patch-configure,v 1.3 2020/09/19 14:04:29 taca Exp $
* Add "--with-nbsdops" option, NetBSD standard options.
* Link with util(3) in the case of DragonFly, too.
@@ -7,9 +7,9 @@
functions (HAVE_KRB5_*).
* Remove setting sysconfdir to "/etc".
---- configure.orig 2019-12-26 06:24:43.000000000 +0200
-+++ configure 2019-12-28 21:41:28.049372280 +0200
-@@ -869,6 +869,7 @@
+--- configure.orig 2020-06-12 13:15:11.000000000 +0000
++++ configure
+@@ -870,6 +870,7 @@ with_libpath
with_libraries
with_efence
with_csops
@@ -17,7 +17,7 @@
with_passwd
with_skey
with_opie
-@@ -1581,7 +1582,7 @@
+@@ -1592,7 +1593,7 @@ Fine tuning of the installation director
--bindir=DIR user executables [EPREFIX/bin]
--sbindir=DIR system admin executables [EPREFIX/sbin]
--libexecdir=DIR program executables [EPREFIX/libexec]
@@ -25,8 +25,8 @@
+ --sysconfdir=DIR read-only single-machine data [PREFIX/etc]
--sharedstatedir=DIR modifiable architecture-independent data [PREFIX/com]
--localstatedir=DIR modifiable single-machine data [PREFIX/var]
- --libdir=DIR object code libraries [EPREFIX/lib]
-@@ -1694,6 +1695,7 @@
+ --runstatedir=DIR modifiable per-process data [LOCALSTATEDIR/run]
+@@ -1706,6 +1707,7 @@ Optional Packages:
--with-libraries additional libraries to link with
--with-efence link with -lefence for malloc() debugging
--with-csops add CSOps standard options
@@ -34,7 +34,7 @@
--without-passwd don't use passwd/shadow file for authentication
--with-skey[=DIR] enable S/Key support
--with-opie[=DIR] enable OPIE support
-@@ -4797,6 +4799,23 @@
+@@ -4809,6 +4811,23 @@ fi
@@ -58,7 +58,7 @@
# Check whether --with-passwd was given.
if test "${with_passwd+set}" = set; then :
withval=$with_passwd; case $with_passwd in
-@@ -15925,7 +15944,7 @@
+@@ -15937,7 +15956,7 @@ fi
: ${mansectsu='1m'}
: ${mansectform='4'}
;;
@@ -67,7 +67,7 @@
shadow_funcs="getspnam"
test -z "$with_pam" && AUTH_EXCL_DEF="PAM"
# Check for SECCOMP_SET_MODE_FILTER in linux/seccomp.h
-@@ -18163,7 +18182,7 @@
+@@ -18175,7 +18194,7 @@ if test "x$ac_cv_header_login_cap_h" = x
_ACEOF
LOGINCAP_USAGE='[-c class] '; LCMAN=1
case "$OS" in
@@ -76,7 +76,7 @@
SUDO_LIBS="${SUDO_LIBS} -lutil"
SUDOERS_LIBS="${SUDOERS_LIBS} -lutil"
;;
-@@ -22993,10 +23012,9 @@
+@@ -23018,10 +23037,9 @@ if test ${with_pam-"no"} != "no"; then
# Check for pam_start() in libpam first, then for pam_appl.h.
#
found_pam_lib=no
@@ -89,7 +89,7 @@
$as_echo_n "(cached) " >&6
else
ac_check_lib_save_LIBS=$LIBS
-@@ -23020,18 +23038,17 @@
+@@ -23045,18 +23063,17 @@ return pam_start ();
}
_ACEOF
if ac_fn_c_try_link "$LINENO"; then :
@@ -113,7 +113,7 @@
found_pam_lib=yes
fi
-@@ -23766,6 +23783,8 @@
+@@ -23791,6 +23808,8 @@ fi
rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext
AUTH_OBJS="$AUTH_OBJS kerb5.lo"
fi
@@ -122,7 +122,7 @@
_LIBS="$LIBS"
LIBS="${LIBS} ${SUDOERS_LIBS}"
for ac_func in krb5_verify_user krb5_init_secure_context
-@@ -27026,7 +27045,6 @@
+@@ -27051,7 +27070,6 @@ test "$datarootdir" = '${prefix}/share'
test "$docdir" = '${datarootdir}/doc/${PACKAGE_TARNAME}' && docdir='$(datarootdir)/doc/$(PACKAGE_TARNAME)'
test "$localedir" = '${datarootdir}/locale' && localedir='$(datarootdir)/locale'
test "$localstatedir" = '${prefix}/var' && localstatedir='$(prefix)/var'
Home |
Main Index |
Thread Index |
Old Index