Commit Graph

15 Commits

Author SHA1 Message Date
Adolf Belka
15bf66e56f sudo: Update to version 1.9.8p2
- v2 version is to extend from 1.9.8p1 to 1.9.8p2
- Update from 1.9.7p2 to 1.9.8p2
- Update rootfile
- Changelog
   What's new in Sudo 1.9.8p2
    * Fixed a potential out-of-bounds read with "sudo -i" when the
      target user's shell is bash.  This is a regression introduced
      in sudo 1.9.8.  Bug #998.
    * sudo_logsrvd now only sends a log ID for first command of a session.
      There is no need to send the log ID for each sub-command.
    * Fixed a few minor memory leaks in intercept mode.
    * Fixed a problem with sudo_logsrvd in relay mode if "store_first"
      was enabled when handling sub-commands.  A new zero-length journal
      file was created for each sub-command instead of simply using
      the existing journal file.
   What's new in Sudo 1.9.8p1
    * Fixed support for passing a prompt (sudo -p) or a login class
      (sudo -l) on the command line.  This is a regression introduced
      in sudo 1.9.8.  Bug #993.
    * Fixed a crash with "sudo ALL" rules in the LDAP and SSSD back-ends.
      This is a regression introduced in sudo 1.9.8.  Bug #994.
    * Fixed a compilation error when the --enable-static-sudoers configure
      option was specified.  This is a regression introduced in sudo
      1.9.8 caused by a symbol clash with the intercept and log server
      protobuf functions.
   What's new in Sudo 1.9.8
    * It is now possible to transparently intercepting sub-commands
      executed by the original command run via sudo.  Intercept support
      is implemented using LD_PRELOAD (or the equivalent supported by
      the system) and so has some limitations.  The two main limitations
      are that only dynamic executables are supported and only the
      execl, execle, execlp, execv, execve, execvp, and execvpe library
      functions are currently intercepted. Its main use case is to
      support restricting privileged shells run via sudo.
      To support this, there is a new "intercept" Defaults setting and
      an INTERCEPT command tag that can be used in sudoers.  For example:
         Cmnd_Alias SHELLS=/bin/bash, /bin/sh, /bin/csh, /bin/ksh, /bin/zsh
         Defaults!SHELLS intercept
      would cause sudo to run the listed shells in intercept mode.
      This can also be set on a per-rule basis.  For example:
         Cmnd_Alias SHELLS=/bin/bash, /bin/sh, /bin/csh, /bin/ksh, /bin/zsh
         chuck ALL = INTERCEPT: SHELLS
      would only apply intercept mode to user "chuck" when running one
      of the listed shells.
      In intercept mode, sudo will not prompt for a password before
      running a sub-command and will not allow a set-user-ID or
      set-group-ID program to be run by default.  The new
      intercept_authenticate and intercept_allow_setid sudoers settings
      can be used to change this behavior.
    * The new "log_subcmds" sudoers setting can be used to log additional
      commands run in a privileged shell.  It uses the same mechanism as
      the intercept support described above and has the same limitations.
    * The new "log_exit_status" sudoers setting can be used to log
      the exit status commands run via sudo.  This is also a corresponding
      "log_exit" setting in the sudo_logsrvd.conf eventlog stanza.
    * Support for logging sudo_logsrvd errors via syslog or to a file.
      Previously, most sudo_logsrvd errors were only visible in the
      debug log.
    * Better diagnostics when there is a TLS certificate validation error.
    * Using the "+=" or "-=" operators in a Defaults setting that takes
      a string, not a list, now produces a warning from sudo and a
      syntax error from inside visudo.
    * Fixed a bug where the "iolog_mode" setting in sudoers and sudo_logsrvd
      had no effect when creating I/O log parent directories if the I/O log
      file name ended with the string "XXXXXX".
    * Fixed a bug in the sudoers custom prompt code where the size
      parameter that was passed to the strlcpy() function was incorrect.
      No overflow was possible since the correct amount of memory was
      already pre-allocated.
    * The mksigname and mksiglist helper programs are now built with
      the host compiler, not the target compiler, when cross-compiling.
      Bug #989.
    * Fixed compilation error when the --enable-static-sudoers configure
      option was specified.  This was due to a typo introduced in sudo
      1.9.7.  GitHub PR #113.
   For more details of the changes then view the ChangeLog file in the source tarball
     or at https://www.sudo.ws/changes.html

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2021-12-03 22:36:43 +01:00
Adolf Belka
9ff6b6c8bd sudo: Update to version 1.9.7p2
- Update from 1.9.7p1 to 1.9.7p2
- Update of rootfile not required.
- Changelog - more details can be found at https://www.sudo.ws/changes.html
   Major changes between version 1.9.7p2 and 1.9.7p1:
     When formatting JSON output, octal numbers are now stored as strings, not numbers.
      The JSON spec does not actually support octal numbers with a 0 prefix.
     Fixed a compilation issue on Solaris 9.
     Sudo now can handle the getgroups() function returning a different number of groups
      for subsequent invocations. GitHub PR #106.
     When loading a Python plugin, python_plugin.so now verifies that the module loaded
      matches the one we tried to load. This allows sudo to display a more useful error
      message when trying to load a plugin with a name that conflicts with a Python
      module installed in the system location.
     Sudo no longer sets the the open files resource limit to unlimited while it runs.
      This avoids a problem where sudo's closefrom() emulation would need to close a
      very large number of descriptors on systems without a way to determine which ones
      are actually open.
     Sudo now includes a configure check for va_copy or __va_copy and only defines its
      own version if the configure test fails.
     Fixed a bug in sudo's utmp file handling which prevented old entries from being
      reused. As a result, the utmp (or utmpx) file was appended to unnecessarily.
      GitHub PR #107.
     Fixed a bug introduced in sudo 1.9.7 that prevented sudo_logsrvd from accepting TLS
      connections when OpenSSL is used. Bug #988.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 17:39:54 +00:00
Adolf Belka
7be45a5f48 sudo: Update to 1.9.7p1
- Update from 1.9.7 to 1.9.7p1
- Update of rootfile not required.
- Changelog
   Major changes between sudo 1.9.7p1 and 1.9.7
    * Fixed an SELinux sudoedit bug when the edited temporary file
      could not be opened.  The sesh helper would still be run even
      when there are no temporary files available to install.
    * Fixed a compilation problem on FreeBSD.
    * The sudo_noexec.so file is now built as a module on all systems
      other than macOS.  This makes it possible to use other libtool
      implementations such as slibtool.  On macOS shared libraries and
      modules are not interchangeable and the version of libtool shipped
      with sudo must be used.
    * Fixed a few bugs in the getgrouplist() emulation on Solaris when
      reading from the local group file.
    * Fixed a bug in sudo_logsrvd that prevented periodic relay server
      connection retries from occurring in "store_first" mode.
    * Disabled the nss_search()-based getgrouplist() emulation on HP-UX
      due to a crash when the group source is set to "compat" in
      /etc/nsswitch.conf.  This is probably due to a mismatch between
      include/compat/nss_dbdefs.h and what HP-UX uses internally.  On
      HP-UX we now just cycle through groups the slow way using
      getgrent().  Bug #978.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-14 09:05:04 +00:00
Adolf Belka
76d608b6e9 sudo: Update to 1.9.7
- Update from 1.9.6p1 to 1.9.7
- Update of rootfile not required
- Changelog
    The fuzz Makefile target now runs all the fuzzers for 8192 passes (can be overridden via the FUZZ_RUNS variable). This makes it easier to run the fuzzers in-tree. To run a fuzzer indefinitely, set FUZZ_RUNS=-1, e.g. make FUZZ_RUNS=-1 fuzz.
    Fixed fuzzing on FreeBSD where the ld.lld linker returns an error by default when a symbol is multiply-defined.
    Added support for determining local IPv6 addresses on systems that lack the getifaddrs() function. This now works on AIX, HP-UX and Solaris (at least). Bug #969.
    Fixed a bug introduced in sudo 1.9.6 that caused sudo -V to report a usage error. Also, when invoked as sudoedit, sudo now allows a more restricted set of options that matches the usage statement and documentation. GitHub Issue #95.
    Fixed a crash in sudo_sendlog when the specified certificate or key does not exist or is invalid. Bug #970.
    Fixed a compilation error when sudo is configured with the disable-log-clientoption.
    Sudo's limited support for SUCCESS=return entries in nsswitch.conf is now documented. Bug #971.
    Sudo now requires autoconf 2.70 or higher to regenerate the configure script. Bug #972.
    sudo_logsrvd now has a relay mode which can be used to create a hierarchy of log servers. By default, when a relay server is defined, messages from the client are forwarded immediately to the relay. However, if the store_first setting is enabled, the log will be stored locally until the command completes and then relayed. Bug #965.
    Sudo now links with OpenSSL by default if it is available unless the --disable-openssl configure option is used or both the --disable-log-client and --disable-log-server configure options are specified.
    Fixed configure's Python version detection when the version minor number is more than a single digit, for example Python 3.10.
    The sudo Python module tests now pass for Python 3.10.
    Sudo will now avoid changing the datasize resource limit as long as the existing value is at least 1GB. This works around a problem on 64-bit HP-UX where it is not possible to exactly restore the original datasize limit. Bug #973.
    Fixed a race condition that could result in a hang when sudo is executed by a process where the SIGCHLD handler is set to SIG_IGN. This fixes the bug described by GitHub PR #98.
    Fixed an out-of-bounds read in sudoedit and visudo when the EDITOR, VISUAL or SUDO_EDITOR environment variables end in an unescaped backslash. Also fixed the handling of quote characters that are escaped by a backslash. GitHub Issue #99.
    Fixed a bug that prevented the log_server_verify sudoers option from taking effect.
    The sudo_sendlog utility has a new -s option to cause it to stop sending I/O records after a user-specified elapsed time. This can be used to test the I/O log restart functionality of sudo_logsrvd.
    Fixed a crash introduced in sudo 1.9.4 in sudo_logsrvd when attempting to restart an interrupted I/O log transfer.
    The TLS connection timeout in the sudoers log client was previously hard-coded to 10 seconds. It now uses the value of log_server_timeout.
    The configure script now outputs a summary of the user-configurable options at the end, separate from output of configure script tests. Bug #820.
    Corrected the description of which groups may be specified via the -g option in the Runas_Spec section. Bug #975.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-16 11:58:57 +00:00
Adolf Belka
c6dc627d4e sudo: Update to 1.9.6p1
- Update from 1.9.5p2 to 1.9.6p1
- Update not required for rootfile
- Changelog
Major changes between version 1.9.6p1 and 1.9.6:
    Fixed a regression introduced in sudo 1.9.6 that resulted in an error message instead of a usage message when sudo is run with no arguments.
Major changes between version 1.9.6 and 1.9.5p2:
    Fixed a sudo_sendlog compilation problem with the AIX xlC compiler.
    Fixed a regression introduced in sudo 1.9.4 where the --disable-root-mailer configure option had no effect.
    Added a --disable-leaks configure option that avoids some memory leaks on exit that would otherwise occur. This is intended to be used with development tools that measure memory leaks. It is not safe to use in production at this time.
    Plugged some memory leaks identified by oss-fuzz and ASAN.
    Fixed the handling of sudoOptions for an LDAP sudoRole that contains multiple sudoCommands. Previously, some of the options would only be applied to the first sudoCommand.
    Fixed a potential out of bounds read in the parsing of NOTBEFORE and NOTAFTER sudoers command options (and their LDAP equivalents).
    The parser used for reading I/O log JSON files is now more resilient when processing invalid JSON.
    Fixed typos that prevented make uninstall from working. GitHub issue #87.
    Fixed a regression introduced in sudo 1.9.4 where the last line in a sudoers file might not have a terminating NUL character added if no newline was present.
    Integrated oss-fuzz and LLVM's libFuzzer with sudo. The new --enable-fuzzer configure option can be combined with the --enable-sanitizer option to build sudo with fuzzing support. Multiple fuzz targets are available for fuzzing different parts of sudo. Fuzzers are built and tested via make fuzz or as part of make check (even when sudo is not built with fuzzing support). Fuzzing support currently requires the LLVM clang compiler (not gcc).
    Fixed the --enable-static-sudoers configure option. GitHub issue #92.
    Fixed a potential out of bounds read sudo when is run by a user with more groups than the value of max_groups in sudo.conf.
    Added an admin_flag sudoers option to make the use of the ~/.sudo_as_admin_successful file configurable on systems where sudo is build with the --enable-admin-flag configure option. This mostly affects Ubuntu and its derivatives. GitHub issue #56.
    The max_groups setting in sudo.conf is now limited to 1024. This setting is obsolete and should no longer be needed.
    Fixed a bug in the tilde expansion of CHROOT=dir and CWD=dir sudoers command options. A path ~/foo was expanded to /home/userfoo instead of /home/user/foo. This also affects the runchroot and runcwd Defaults settings.
    Fixed a bug on systems without a native getdelim(3) function where very long lines could cause parsing of the sudoers file to end prematurely. Bug #960.
    Fixed a potential integer overflow when converting the timestamp_timeout and passwd_timeout sudoers settings to a timespec struct.
    The default for the group_source setting in sudo.conf is now dynamic on macOS. Recent versions of macOS do not reliably return all of a user's non-local groups via getgroups(2), even when _DARWIN_UNLIMITED_GETGROUPS is defined. Bug #946.
    Fixed a potential use-after-free in the PAM conversation function. Bug #967.
    Fixed potential redefinition of sys/stat.h macros in sudo_compat.h. Bug #968.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-18 11:20:57 +00:00
Adolf Belka
273708295b sudo: Upgrade to 1.9.5p2
- Update sudo from 1.9.5p1 to 1.9.5p2
- Major changes between version 1.9.5p2 and 1.9.5p1:
    Fixed sudo's setprogname(3) emulation on systems that don't provide it.
    Fixed a problem with the sudoers log server client where a partial write to the server could result the sudo process consuming large amounts of CPU time due to a cycle in the buffer queue. Bug #954.
    Added a missing dependency on libsudo_util in libsudo_eventlog. Fixes a link error when building sudo statically.
    The user's KRB5CCNAME environment variable is now preserved when performing PAM authentication. This fixes GSSAPI authentication when the user has a non-default ccache.
    When invoked as sudoedit, the same set of command line options are now accepted as for sudo -e. The -H and -P options are now rejected for sudoedit and sudo -e which matches the sudo 1.7 behavior. This is part of the fix for CVE-2021-3156.
    Fixed a potential buffer overflow when unescaping backslashes in the command's arguments. Normally, sudo escapes special characters when running a command via a shell (sudo -s or sudo -i). However, it was also possible to run sudoedit with the -s or -i flags in which case no escaping had actually been done, making a buffer overflow possible. This fixes CVE-2021-3156.
- No change to rootfile

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-01-27 21:06:57 +00:00
Adolf Belka
161613165a sudo: Upgrade to 1.9.5p1
- Upgrade sudo from 1.8.10p3 to 1.9.5p1
- Move sudo from legacy release (1.8) branch to stable release (1.9) branch
- Update rootfile
- Changelog available at https://www.sudo.ws/changes.html
- Tested out on vm testbed and sudo is working correctly

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-01-18 13:04:33 +00:00
Peter Müller
eee037b890 update disclaimer in LFS files
Most of these files still used old dates and/or domain names for contact
mail addresses. This is now replaced by an up-to-date copyright line.

Just some housekeeping... :-)

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-09-10 19:20:36 +01:00
Matthias Fischer
3951a1135f sudo: Fix for lfs-file (Typo)
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-12-02 12:23:16 +00:00
Michael Tremer
520fd2431b sudo: Update to 1.8.10p3.
Disable linking against PAM which is not configured
in IPFire 2.
2014-05-28 20:23:13 +02:00
Michael Tremer
d5e94f72f6 sudo: Update to 1.8.10p1. 2014-03-15 15:08:37 +01:00
ms
70df830214 Ein Paar Dateien fuer die GPLv3 angepasst.
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@853 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2007-08-29 13:25:32 +00:00
ms
fd3e7da032 Zwischencommit fuer LFS.
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@324 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-10-15 20:25:07 +00:00
ms
a68fedca8f Hinzugefügt:
* IPTables ins Webinterface - Muss der Benne nochmal drüberkucken!
Geändert:
  * Blinde Datei oh323 gelöscht.
  * Kein sudo-Paket mehr, da bereits in ISO.
  * makegraphs gefixt wegen hddtemp
  * Menü im Webinterface wieder einmal bearbeitet.


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@171 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-06-12 15:00:19 +00:00
ms
c96732622b Hinzugefügt:
* Xinetd - Super-Daemon
  * Sudo


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@98 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-04-10 18:39:59 +00:00