Next | Query returned 2 messages, browsing 1 to 10 | previous

History of commit frequency

CVS Commit History:


   2017-06-13 20:46:57 by Benny Siegert | Files touched by this commit (2) | Package updated
Log message:
Pullup ticket #5477 - requested by sevan
security/sudo: security fix

Revisions pulled up:
- security/sudo/Makefile                                        1.155
- security/sudo/distinfo                                        1.92

---
   Module Name:    pkgsrc
   Committed By:   spz
   Date:           Wed Jun  7 05:41:53 UTC 2017

   Modified Files:
           pkgsrc/security/sudo: Makefile distinfo

   Log message:
   update to version 1.8.20p2

   upstream changelog:
   2017-05-31  Todd C. Miller  <Todd.Miller%courtesan.com@localhost>

           * NEWS, configure, configure.ac:
           Sudo 1.8.20p2
           [47836f4c9834]

           * src/ttyname.c:
           A command name may also contain newline characters so read
           /proc/self/stat until EOF. It is not legal for /proc/self/stat to
           contain embedded NUL bytes so treat the file as corrupt if we see
           any. With help from Qualys.

           This is not exploitable due to the /dev traversal changes in sudo
           1.8.20p1 (thanks Solar!).
           [15a46f4007dd]

   2017-05-30  Todd C. Miller  <Todd.Miller%courtesan.com@localhost>

           * src/ttyname.c:
           Use /proc/self consistently on Linux. As far as I know, only AIX
           doesn't support /proc/self.
           [6f3d9816541b]
   2017-05-31 08:22:52 by S.P.Zeidler | Files touched by this commit (7) | Package updated
Log message:
Pullup ticket #5470 - requested by maya
security/sudo: security update

Revisions pulled up:
- security/sudo/Makefile                                        1.154
- security/sudo/distinfo                                        1.89-1.91
- security/sudo/patches/patch-af                                1.34
- security/sudo/patches/patch-ag                                1.25-1.26
- security/sudo/patches/patch-include_sudo__compat.h            1.1
- security/sudo/patches/patch-include_sudo__event.h             1.1
- security/sudo/patches/patch-src_Makefile.in                   1.2

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	maya
   Date:		Tue May 30 16:14:56 UTC 2017

   Modified Files:
   	pkgsrc/security/sudo: Makefile distinfo
   	pkgsrc/security/sudo/patches: patch-af patch-ag patch-src_Makefile.in
   Added Files:
   	pkgsrc/security/sudo/patches: patch-include_sudo__event.h

   Log message:
   sudo: update to 1.8.20p1.
   Fixes CVE-2017-1000367, local privilege escalation on linux.

   What's new in Sudo 1.8.20p1

    * Fixed "make check" when using OpenSSL or GNU crypt.
      Bug #787.

    * Fixed CVE-2017-1000367, a bug parsing /proc/pid/stat on Linux
      when the process name contains spaces.  Since the user has control
      over the command name, this could potentially be used by a user
      with sudo access to overwrite an arbitrary file on systems with
      SELinux enabled.  Also stop performing a breadth-first traversal
      of /dev when looking for the device; only a hard-coded list of
      directories are checked,

   What's new in Sudo 1.8.20

    * Added support for SASL_MECH in ldap.conf. Bug #764

    * Added support for digest matching when the command is a glob-style
      pattern or a directory. Previously, only explicit path matches
      supported digest checks.

    * New "fdexec" Defaults option to control whether a command
      is executed by path or by open file descriptor.

    * The embedded copy of zlib has been upgraded to version 1.2.11.

    * Fixed a bug that prevented sudoers include files with a relative
      path starting with the letter 'i' from being opened.  Bug #776.

    * Added support for command timeouts in sudoers.  The command will
      be terminated if the timeout expires.

    * The SELinux role and type are now displayed in the "sudo -l"
      output for the LDAP and SSSD backends, just as they are in the
      sudoers backend.

    * A new command line option, -T, can be used to specify a command
      timeout as long as the user-specified timeout is not longer than
      the timeout specified in sudoers.  This option may only be
      used when the "user_command_timeouts" flag is enabled in sudoers.

    * Added NOTBEFORE and NOTAFTER command options to the sudoers
      backend similar to what is already available in the LDAP backend.

    * Sudo can now optionally use the SHA2 functions in OpenSSL or GNU
      crypt instead of the SHA2 implementation bundled with sudo.

    * Fixed a compilation error on systems without the stdbool.h header
      file.  Bug #778.

    * Fixed a compilation error in the standalone Kerberos V authentication
      module.  Bug #777.

    * Added the iolog_flush flag to sudoers which causes I/O log data
      to be written immediately to disk instead of being buffered.

    * I/O log files are now created with group ID 0 by default unless
      the "iolog_user" or "iolog_group" options are set in \ 
sudoers.

    * It is now possible to store I/O log files on an NFS-mounted
      file system where uid 0 is remapped to an unprivileged user.
      The "iolog_user" option must be set to a non-root user and the
      top-level I/O log directory must exist and be owned by that user.

    * Added the restricted_env_file setting to sudoers which is similar
      to env_file but its contents are subject to the same restrictions
      as variables in the invoking user's environment.

    * Fixed a use after free bug in the SSSD backend when the fqdn
      sudoOption is enabled and no hostname value is present in
      /etc/sssd/sssd.conf.

    * Fixed a typo that resulted in a compilation error on systems
      where the killpg() function is not found by configure.

    * Fixed a compilation error with the included version of zlib
      when sudo was built outside the source tree.

    * Fixed the exit value of sudo when the command is terminated by
      a signal other than SIGINT.  This was broken in sudo 1.8.15 by
      the fix for Bug #722.  Bug #784.

    * Fixed a regression introduced in sudo 1.8.18 where the "lecture"
      option could not be used in a positive boolean context, only
      a negative one.

    * Fixed an issue where sudo would consume stdin if it was not
      connected to a tty even if log_input is not enabled in sudoers.
      Bug #786.

    * Clarify in the sudoers manual that the #includedir directive
      diverts control to the files in the specified directory and,
      when parsing of those files is complete, returns control to the
      original file.  Bug #775.

   What's new in Sudo 1.8.19p2

    * Fixed a crash in visudo introduced in sudo 1.8.9 when an IP address
      or network is used in a host-based Defaults entry.  Bug #766

    * Added a missing check for the ignore_iolog_errors flag when
      the sudoers plugin generates the I/O log file path name.

    * Fixed a typo in sudo's vsyslog() replacement that resulted in
      garbage being logged to syslog.

   What's new in Sudo 1.8.19p1

    * Fixed a bug introduced in sudo 1.8.19 that resulted in the wrong
      syslog priority and facility being used.

   What's new in Sudo 1.8.19

    * New "syslog_maxlen" Defaults option to control the maximum size of
      syslog messages generated by sudo.

    * Sudo has been run against PVS-Studio and any issues that were
      not false positives have been addressed.

    * I/O log files are now created with the same group ID as the
      parent directory and not the invoking user's group ID.

    * I/O log permissions and ownership are now configurable via the
      "iolog_mode", "iolog_user" and "iolog_group" \ 
sudoers Defaults
      variables.

    * Fixed configuration of the sudoers I/O log plugin debug subsystem.
      Previously, I/O log information was not being written to the
      sudoers debug log.

    * Fixed a bug in visudo that broke editing of files in an include
      dir that have a syntax error.  Normally, visudo does not edit
      those files, but if a syntax error is detected in one, the user
      should get a chance to fix it.

    * Warnings about unknown or unparsable sudoers Defaults entries now
      include the file and line number of the problem.

    * Visudo will now use the file and line number information about an
      unknown or unparsable Defaults entry to go directly to the file
      with the problem.

    * Fixed a bug in the sudoers LDAP back-end where a negated sudoHost
      entry would prevent other sudoHost entries following it from matching.

    * Warnings from visudo about a cycle in an Alias entry now include the
      file and line number of the problem.

    * In strict mode, visudo will now use the file and line number
      information about a cycle in an Alias entry to go directly to the
      file with the problem.

    * The sudo_noexec.so file is now linked with -ldl on systems that
      require it for the wordexp() wrapper.

    * Fixed linking of sudo_noexec.so on macOS systems where it must be
      a dynamic library and not a module.

    * Sudo's "make check" now includes a test for sudo_noexec.so
      working.

    * The sudo front-end now passes the user's umask to the plugin.
      Previously the plugin had to determine this itself.

    * Sudoreplay can now display the stdin and ttyin streams when they
      are explicitly added to the filter list.

    * Fixed a bug introduced in sudo 1.8.17 where the "all" setting
      for verifypw and listpw was not being honored.  Bug #762.

    * The syslog priority (syslog_goodpri and syslog_badpri) can now
      be negated or set to "none" to disable logging of successful or
      unsuccessful sudo attempts via syslog.

   What's new in Sudo 1.8.18p1

    * When sudo_noexec.so is used, the WRDE_NOCMD flag is now added
      if the wordexp() function is called.  This prevents commands
      from being run via wordexp() without disabling it entirely.

    * On Linux systems, sudo_noexec.so now uses a seccomp filter to
      disable execute access if the kernel supports seccomp.  This is
      more robust than the traditional method of using stub functions
      that return an error.

   What's new in Sudo 1.8.18

    * The sudoers locale is now set before parsing the sudoers file.
      If sudoers_locale is set in sudoers, it is applied before
      evaluating other Defaults entries.  Previously, sudoers_locale
      was used when evaluating sudoers but not during the inital parse.
      Bug #748.

    * A missing or otherwise invalid #includedir is now ignored instead
      of causing a parse error.

    * During "make install", backup files are only used on HP-UX where
      it is not possible to unlink a shared object that is in use.
      This works around a bug in ldconfig on Linux which could create
      links to the backup shared library file instead of the current
      one.

    * Fixed a bug introduced in 1.8.17 where sudoers entries with long
      commands lines could be truncated, preventing a match.  Bug #752.

    * The fqdn, runas_default and sudoers_locale Defaults settings are
      now applied before any other Defaults settings since they can
      change how other Defaults settings are parsed.

    * On systems without the O_NOFOLLOW open(2) flag, when the NOFOLLOW
      flag is set, sudoedit now checks whether the file is a symbolic link
      before opening it as well as after the open.  Bug #753.

    * Sudo will now only resolve a user's group IDs to group names
      when sudoers includes group-based permissions.  Group lookups
      can be expensive on some systems where the group database is
      not local.

    * If the file system holding the sudo log file is full, allow
      the command to run unless the new ignore_logfile_errors Defaults
      option is disabled.  Bug #751.

    * The ignore_audit_errors and ignore_iolog_errors Defaults options
      have been added to control sudo's behavior when it is unable to
      write to the audit and I/O logs.

    * Fixed a bug introduced in 1.8.17 where the SIGPIPE signal handler
      was not being restored when sudo directly executes the command.

    * Fixed a bug where "sudo -l command" would indicate that a command
      was runnable even when denied by sudoers when using the LDAP or
      SSSD backends.

    * The match_group_by_gid Defaults option has been added to allow
      sites where group name resolution is slow and where sudoers only
      contains a small number of groups to match groups by group ID
      instead of by group name.

    * Fixed a bug on Linux where a 32-bit sudo binary could fail with
      an "unable to allocate memory" error when run on a 64-bit system.
      Bug #755

    * When parsing ldap.conf, sudo will now only treat a '#' character
      as the start of a comment when it is at the beginning of the
      line.

    * Fixed a potential crash when auditing is enabled and the audit
      function fails with an error.  Bug #756

    * Norwegian Nynorsk translation for sudo from translationproject.org.

    * Fixed a typo that broke short host name matching when the fqdn
      flag is enabled in sudoers.  Bug #757

    * Negated sudoHost attributes are now supported by the LDAP and
      SSSD backends.

    * Fixed matching entries in the LDAP and SSSD backends when a
      RunAsGroup is specified but no RunAsUser is present.

    * Fixed "sudo -l" output in the LDAP and SSSD backends when a
      RunAsGroup is specified but no RunAsUser is present.

   To generate a diff of this commit:
   cvs rdiff -u -r1.153 -r1.154 pkgsrc/security/sudo/Makefile
   cvs rdiff -u -r1.88 -r1.89 pkgsrc/security/sudo/distinfo
   cvs rdiff -u -r1.33 -r1.34 pkgsrc/security/sudo/patches/patch-af
   cvs rdiff -u -r1.24 -r1.25 pkgsrc/security/sudo/patches/patch-ag
   cvs rdiff -u -r0 -r1.1 \
       pkgsrc/security/sudo/patches/patch-include_sudo__event.h
   cvs rdiff -u -r1.1 -r1.2 pkgsrc/security/sudo/patches/patch-src_Makefile.in

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   maya
   Date:           Wed May 31 02:22:02 UTC 2017

   Modified Files:
           pkgsrc/security/sudo: distinfo
   Added Files:
           pkgsrc/security/sudo/patches: patch-include_sudo__compat.h

   Log message:
   sudo: workaround deficiencies in netbsd 6,7

   NetBSD 7 doesn't define WCONTINUED or WIFCONTINUED, so provide
   failure fallback definitions.

   Thanks nonaka for the heads up.

   To generate a diff of this commit:
   cvs rdiff -u -r1.89 -r1.90 pkgsrc/security/sudo/distinfo
   cvs rdiff -u -r0 -r1.1 \
       pkgsrc/security/sudo/patches/patch-include_sudo__compat.h

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   maya
   Date:           Wed May 31 02:33:12 UTC 2017

   Modified Files:
           pkgsrc/security/sudo: distinfo
           pkgsrc/security/sudo/patches: patch-ag

   Log message:
   sudo: include the full regen of configure script.
   I tried to exclude a hunk that seemed new, but that is probably wrong.

   It didn't cause problems on my end at first, but does fail for others.

   To generate a diff of this commit:
   cvs rdiff -u -r1.90 -r1.91 pkgsrc/security/sudo/distinfo
   cvs rdiff -u -r1.25 -r1.26 pkgsrc/security/sudo/patches/patch-ag

Next | Query returned 2 messages, browsing 1 to 10 | previous