pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/security/sudo
Module Name: pkgsrc
Committed By: taca
Date: Sat Sep 19 14:04:29 UTC 2020
Modified Files:
pkgsrc/security/sudo: Makefile distinfo
pkgsrc/security/sudo/patches: patch-configure
Log Message:
security/sudo: update to 1.8.31p2
Update sudo package to 1.8.31p2.
What's new in Sudo 1.8.31p2
* Sudo command line options that take a value may only be specified
once. This is to help guard against problems caused by poorly
written scripts that invoke sudo with user-controlled input.
Bug #924.
* When running a command in a pty, sudo will no longer try to
suspend itself if the user's tty has been revoked (for instance
when the parent ssh daemon is killed). This fixes a bug where
sudo would continuously suspend the command (which would succeed),
then suspend itself (which would fail due to the missing tty)
and then resume the command.
* If sudo's event loop fails due to the tty being revoked, remove
the user's tty events and restart the event loop (once). This
fixes a problem when running "sudo reboot" in a pty on some
systems. When the event loop exited unexpectedly, sudo would
kill the command running in the pty, which in the case of "reboot",
could lead to the system being in a half-rebooted state.
* Fixed a regression introduced in sudo 1.8.23 in the LDAP and
SSSD back-ends where a missing sudoHost attribute was treated
as an "ALL" wildcard value. A sudoRole with no sudoHost attribute
is now ignored as it was prior to version 1.8.23.
To generate a diff of this commit:
cvs rdiff -u -r1.179 -r1.180 pkgsrc/security/sudo/Makefile
cvs rdiff -u -r1.110 -r1.111 pkgsrc/security/sudo/distinfo
cvs rdiff -u -r1.2 -r1.3 pkgsrc/security/sudo/patches/patch-configure
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/security/sudo/Makefile
diff -u pkgsrc/security/sudo/Makefile:1.179 pkgsrc/security/sudo/Makefile:1.180
--- pkgsrc/security/sudo/Makefile:1.179 Tue Apr 28 05:29:18 2020
+++ pkgsrc/security/sudo/Makefile Sat Sep 19 14:04:29 2020
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.179 2020/04/28 05:29:18 taca Exp $
+# $NetBSD: Makefile,v 1.180 2020/09/19 14:04:29 taca Exp $
-DISTNAME= sudo-1.8.31p1
+DISTNAME= sudo-1.8.31p2
CATEGORIES= security
MASTER_SITES= https://www.sudo.ws/dist/
MASTER_SITES+= ftp://ftp.sudo.ws/pub/sudo/
Index: pkgsrc/security/sudo/distinfo
diff -u pkgsrc/security/sudo/distinfo:1.110 pkgsrc/security/sudo/distinfo:1.111
--- pkgsrc/security/sudo/distinfo:1.110 Tue Apr 28 05:29:18 2020
+++ pkgsrc/security/sudo/distinfo Sat Sep 19 14:04:29 2020
@@ -1,10 +1,10 @@
-$NetBSD: distinfo,v 1.110 2020/04/28 05:29:18 taca Exp $
+$NetBSD: distinfo,v 1.111 2020/09/19 14:04:29 taca Exp $
-SHA1 (sudo-1.8.31p1.tar.gz) = b959be78c815e37d893c5c481975b9793f9ed227
-RMD160 (sudo-1.8.31p1.tar.gz) = ace03e181e4240fde407f5353b363f28a72900c1
-SHA512 (sudo-1.8.31p1.tar.gz) = 9344fd1d8a8445e8afb9c5628cdc832fe32ea29199f071f35fb6ec694371801556df560f4382afec199f468b1f3264ad5e3a89e964612e571b8d911f823724cc
-Size (sudo-1.8.31p1.tar.gz) = 3351312 bytes
+SHA1 (sudo-1.8.31p2.tar.gz) = 53a6dfa90f78bc10615b83b7026bf3ba206c69e9
+RMD160 (sudo-1.8.31p2.tar.gz) = 5ffd8e785095c19c26ad8e3b3d5768669951f777
+SHA512 (sudo-1.8.31p2.tar.gz) = ad1bbbde74d3ab6e947071c6f21e436ebabcf5af11ecc75cde8f0c01ca0b8c6ae1cce2ff42f21612816c636e96722a2a14daa57757644ceab6577091f82242be
+Size (sudo-1.8.31p2.tar.gz) = 3353538 bytes
SHA1 (patch-Makefile.in) = e8813e1aa208d9ef6304038328504a5402341560
-SHA1 (patch-configure) = 906a90a8e8f5397693d9f410b7715439cf029508
+SHA1 (patch-configure) = 498b1040fceb317c239d050b59b3d1a180598441
SHA1 (patch-plugins_sudoers_Makefile.in) = 730193c6437197a7114dd31886050cecdcba6772
SHA1 (patch-src_Makefile.in) = 8959049bc428f592f84de1cad1a898c07c6e6b39
Index: pkgsrc/security/sudo/patches/patch-configure
diff -u pkgsrc/security/sudo/patches/patch-configure:1.2 pkgsrc/security/sudo/patches/patch-configure:1.3
--- pkgsrc/security/sudo/patches/patch-configure:1.2 Sat Dec 28 20:43:56 2019
+++ pkgsrc/security/sudo/patches/patch-configure Sat Sep 19 14:04:29 2020
@@ -1,4 +1,4 @@
-$NetBSD: patch-configure,v 1.2 2019/12/28 20:43:56 kim Exp $
+$NetBSD: patch-configure,v 1.3 2020/09/19 14:04:29 taca Exp $
* Add "--with-nbsdops" option, NetBSD standard options.
* Link with util(3) in the case of DragonFly, too.
@@ -7,9 +7,9 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
functions (HAVE_KRB5_*).
* Remove setting sysconfdir to "/etc".
---- configure.orig 2019-12-26 06:24:43.000000000 +0200
-+++ configure 2019-12-28 21:41:28.049372280 +0200
-@@ -869,6 +869,7 @@
+--- configure.orig 2020-06-12 13:15:11.000000000 +0000
++++ configure
+@@ -870,6 +870,7 @@ with_libpath
with_libraries
with_efence
with_csops
@@ -17,7 +17,7 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
with_passwd
with_skey
with_opie
-@@ -1581,7 +1582,7 @@
+@@ -1592,7 +1593,7 @@ Fine tuning of the installation director
--bindir=DIR user executables [EPREFIX/bin]
--sbindir=DIR system admin executables [EPREFIX/sbin]
--libexecdir=DIR program executables [EPREFIX/libexec]
@@ -25,8 +25,8 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
+ --sysconfdir=DIR read-only single-machine data [PREFIX/etc]
--sharedstatedir=DIR modifiable architecture-independent data [PREFIX/com]
--localstatedir=DIR modifiable single-machine data [PREFIX/var]
- --libdir=DIR object code libraries [EPREFIX/lib]
-@@ -1694,6 +1695,7 @@
+ --runstatedir=DIR modifiable per-process data [LOCALSTATEDIR/run]
+@@ -1706,6 +1707,7 @@ Optional Packages:
--with-libraries additional libraries to link with
--with-efence link with -lefence for malloc() debugging
--with-csops add CSOps standard options
@@ -34,7 +34,7 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
--without-passwd don't use passwd/shadow file for authentication
--with-skey[=DIR] enable S/Key support
--with-opie[=DIR] enable OPIE support
-@@ -4797,6 +4799,23 @@
+@@ -4809,6 +4811,23 @@ fi
@@ -58,7 +58,7 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
# Check whether --with-passwd was given.
if test "${with_passwd+set}" = set; then :
withval=$with_passwd; case $with_passwd in
-@@ -15925,7 +15944,7 @@
+@@ -15937,7 +15956,7 @@ fi
: ${mansectsu='1m'}
: ${mansectform='4'}
;;
@@ -67,7 +67,7 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
shadow_funcs="getspnam"
test -z "$with_pam" && AUTH_EXCL_DEF="PAM"
# Check for SECCOMP_SET_MODE_FILTER in linux/seccomp.h
-@@ -18163,7 +18182,7 @@
+@@ -18175,7 +18194,7 @@ if test "x$ac_cv_header_login_cap_h" = x
_ACEOF
LOGINCAP_USAGE='[-c class] '; LCMAN=1
case "$OS" in
@@ -76,7 +76,7 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
SUDO_LIBS="${SUDO_LIBS} -lutil"
SUDOERS_LIBS="${SUDOERS_LIBS} -lutil"
;;
-@@ -22993,10 +23012,9 @@
+@@ -23018,10 +23037,9 @@ if test ${with_pam-"no"} != "no"; then
# Check for pam_start() in libpam first, then for pam_appl.h.
#
found_pam_lib=no
@@ -89,7 +89,7 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
$as_echo_n "(cached) " >&6
else
ac_check_lib_save_LIBS=$LIBS
-@@ -23020,18 +23038,17 @@
+@@ -23045,18 +23063,17 @@ return pam_start ();
}
_ACEOF
if ac_fn_c_try_link "$LINENO"; then :
@@ -113,7 +113,7 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
found_pam_lib=yes
fi
-@@ -23766,6 +23783,8 @@
+@@ -23791,6 +23808,8 @@ fi
rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext
AUTH_OBJS="$AUTH_OBJS kerb5.lo"
fi
@@ -122,7 +122,7 @@ $NetBSD: patch-configure,v 1.2 2019/12/2
_LIBS="$LIBS"
LIBS="${LIBS} ${SUDOERS_LIBS}"
for ac_func in krb5_verify_user krb5_init_secure_context
-@@ -27026,7 +27045,6 @@
+@@ -27051,7 +27070,6 @@ test "$datarootdir" = '${prefix}/share'
test "$docdir" = '${datarootdir}/doc/${PACKAGE_TARNAME}' && docdir='$(datarootdir)/doc/$(PACKAGE_TARNAME)'
test "$localedir" = '${datarootdir}/locale' && localedir='$(datarootdir)/locale'
test "$localstatedir" = '${prefix}/var' && localstatedir='$(prefix)/var'
Home |
Main Index |
Thread Index |
Old Index