public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: "Peter Müller" <peter.mueller@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH] sudo: Update to version 1.9.9
Date: Sun, 06 Feb 2022 10:05:31 +0000	[thread overview]
Message-ID: <daceaea0-820a-05f9-7954-bb05a39892c8@ipfire.org> (raw)
In-Reply-To: <20220205203343.1998470-1-adolf.belka@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 7153 bytes --]

Reviewed-by: Peter Müller <peter.mueller(a)ipfire.org>

> - Update from 1.9.8p2 to 1.9.9
> - Update of rootfile
> - Changelog
> What's new in Sudo 1.9.9
>  * Sudo can now be built with OpenSSL 3.0 without generating warnings
>    about deprecated OpenSSL APIs.
>  * A digest can now be specified along with the "ALL" command in
>    the LDAP and SSSD back-ends.  Sudo 1.9.0 introduced support for
>    this in the sudoers file but did not include corresponding changes
>    for the other back-ends.
>  * visudo now only warns about an undefined alias or a cycle in an
>    alias once for each alias.
>  * The sudoRole cn was truncated by a single character in warning messages.
>    GitHub issue #115.
>  * The cvtsudoers utility has new --group-file and --passwd-file options
>    to use a custom passwd or group file when the --match-local option is
>    also used.
>  * The cvtsudoers utility can now filter or match based on a command.
>  * The cvtsudoers utility can now produce output in csv (comma-separated
>    value) format.  This can be used to help generate entitlement reports.
>  * Fixed a bug in sudo_logsrvd that could result in the connection being
>    dropped for very long command lines.
>  * Fixed a bug where sudo_logsrvd would not accept a restore point
>    of zero.
>  * Fixed a bug in visudo where the value of the "editor" setting was not
>    used if it did not match the user's EDITOR environment variable.
>    This was only a problem if the "env_editor" setting was not enabled.
>    Bug #1000.
>  * Sudo now builds with the -fcf-protection compiler option and the
>    "-z now" linker option if supported.
>  * The output of "sudoreplay -l" now more closely matches the
>    traditional sudo log format.
>  * The sudo_sendlog utility will now use the full contents of the log.json
>    file, if present.  This makes it possible to send sudo-format I/O logs
>    that use the newer log.json format to sudo_logsrvd without losing any
>    information.
>  * Fixed compilation of the arc4random_buf() replacement on systems with
>    arc4random() but no arc4random_buf().  Bug #1008.
>  * Sudo now uses its own getentropy() by default on Linux.  The GNU libc
>    version of getentropy() will fail on older kernels that don't support
>    the getrandom() system call.
>  * It is now possible to build sudo with WolfSSL's OpenSSL compatibility
>    layer by using the --enable-wolfssl configure option.
>  * Fixed a bug related to Daylight Saving Time when parsing timestamps
>    in Generalized Time format.  This affected the NOTBEFORE and
>    NOTAFTER options in sudoers.  Bug #1006
>  * Added the -O and -P options to visudo, which can be used to check
>    or set the owner and permissions.  This can be used in conjunction
>    with the -c option to check that the sudoers file ownership and
>    permissions are correct.  Bug #1007.
>  * It is now possible to set resource limits in the sudoers file itself.
>    The special values "default" and "user" refer to the default system
>    limit and invoking user limit respectively.  The core dump size limit
>    is now set to 0 by default unless overridden by the sudoers file.
>  * The cvtsudoers utility can now merge multiple sudoers sources into
>    a single, combined sudoers file.  If there are conflicting entries,
>    cvtsudoers will attempt to resolve them but manual intervention
>    may be required.  The merging of sudoers rules is currently fairly
>    simplistic but will be improved in a future release.
>  * Sudo was parsing but not applying the "deref" and "tls_reqcert"
>    ldap.conf settings.  This meant the options were effectively
>    ignored which broke dereferencing of aliases in LDAP.  Bug #1013.
>  * Clarified in the sudo man page that the security policy may
>    override the user's PATH environment variable.  Bug #1014.
>  * When sudo is run in non-interactive mode (with the -n option), it
>    will now attempt PAM authentication and only exit with an error
>    if user interaction is required.  This allows PAM modules that
>    don't interact with the user to succeed.  Previously, sudo
>    would not attempt authentication if the -n option was specified.
>    Bug #956 and GitHub issue #83.
>  * Fixed a regression introduced in version 1.9.1 when sudo is
>    built with the --with-fqdn configure option.  The local host
>    name was being resolved before the sudoers file was processed,
>    making it impossible to disable DNS lookups by negating the
>    "fqdn" sudoers option.  Bug #1016.
>  * Added support for negated sudoUser attributes in the LDAP and
>    SSSD sudoers back ends.  A matching sudoUser that is negated
>    will cause the sudoRole containing it to be ignored.
>  * Fixed a bug where the stack resource limit could be set to a
>    value smaller than that of the invoking user and not be reset
>    before the command was run.  Bug #1017.
> 
> Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org>
> ---
>  config/rootfiles/common/sudo | 17 +++++++++++------
>  lfs/sudo                     |  4 ++--
>  2 files changed, 13 insertions(+), 8 deletions(-)
> 
> diff --git a/config/rootfiles/common/sudo b/config/rootfiles/common/sudo
> index 80e83efa4..1cb0d2bf7 100644
> --- a/config/rootfiles/common/sudo
> +++ b/config/rootfiles/common/sudo
> @@ -30,15 +30,18 @@ usr/lib/sudo/system_group.so
>  #usr/sbin/sudo_sendlog
>  usr/sbin/visudo
>  #usr/share/doc/sudo
> -#usr/share/doc/sudo/CONTRIBUTORS
> +#usr/share/doc/sudo/CONTRIBUTING.md
> +#usr/share/doc/sudo/CONTRIBUTORS.md
>  #usr/share/doc/sudo/ChangeLog
> -#usr/share/doc/sudo/HISTORY
> -#usr/share/doc/sudo/LICENSE
> +#usr/share/doc/sudo/HISTORY.md
> +#usr/share/doc/sudo/LICENSE.md
>  #usr/share/doc/sudo/NEWS
> -#usr/share/doc/sudo/README
> -#usr/share/doc/sudo/TROUBLESHOOTING
> -#usr/share/doc/sudo/UPGRADE
> +#usr/share/doc/sudo/README.md
> +#usr/share/doc/sudo/SECURITY.md
> +#usr/share/doc/sudo/TROUBLESHOOTING.md
> +#usr/share/doc/sudo/UPGRADE.md
>  #usr/share/doc/sudo/examples
> +#usr/share/doc/sudo/examples/cvtsudoers.conf
>  #usr/share/doc/sudo/examples/pam.conf
>  #usr/share/doc/sudo/examples/sudo.conf
>  #usr/share/doc/sudo/examples/sudo_logsrvd.conf
> @@ -58,8 +61,10 @@ usr/sbin/visudo
>  #usr/share/locale/eo/LC_MESSAGES/sudo.mo
>  #usr/share/locale/eo/LC_MESSAGES/sudoers.mo
>  #usr/share/locale/es/LC_MESSAGES/sudo.mo
> +#usr/share/locale/es/LC_MESSAGES/sudoers.mo
>  #usr/share/locale/eu/LC_MESSAGES/sudo.mo
>  #usr/share/locale/eu/LC_MESSAGES/sudoers.mo
> +#usr/share/locale/fa/LC_MESSAGES/sudo.mo
>  #usr/share/locale/fi/LC_MESSAGES/sudo.mo
>  #usr/share/locale/fi/LC_MESSAGES/sudoers.mo
>  #usr/share/locale/fr/LC_MESSAGES/sudo.mo
> diff --git a/lfs/sudo b/lfs/sudo
> index bec0f6021..8fc6879de 100644
> --- a/lfs/sudo
> +++ b/lfs/sudo
> @@ -24,7 +24,7 @@
>  
>  include Config
>  
> -VER        = 1.9.8p2
> +VER        = 1.9.9
>  
>  THISAPP    = sudo-$(VER)
>  DL_FILE    = $(THISAPP).tar.gz
> @@ -40,7 +40,7 @@ objects = $(DL_FILE)
>  
>  $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
>  
> -$(DL_FILE)_MD5 = f831c1d62835cde89c261465d9c781e4
> +$(DL_FILE)_MD5 = f112d8ee214ef46ac6398196958ee383
>  
>  install : $(TARGET)
>  

      reply	other threads:[~2022-02-06 10:05 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-02-05 20:33 Adolf Belka
2022-02-06 10:05 ` Peter Müller [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=daceaea0-820a-05f9-7954-bb05a39892c8@ipfire.org \
    --to=peter.mueller@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox