Commit graph

252 commits

Author SHA1 Message Date
Renato Botelho
01d2e83ad6 security/sudo: Update to 1.9.1
* Add new option PYTHON that enables python plugin support

PR:		246472
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
2020-06-19 14:22:34 +00:00
Dmitry Marakasov
708a56eb72 - Update WWW
Approved by:	portmgr blanket
2020-03-28 09:32:15 +00:00
Renato Botelho
41126d7351 security/sudo: Update to 1.8.31p1
Sponsored by:	Rubicon Communications, LLC (Netgate)
2020-03-18 14:01:53 +00:00
Cy Schubert
59b3422f9b security/sudo update 1.8.30 --> 1.8.31
PR:		243745
Submitted by:	cy@
Reported by:	cy@
Approved by:	garga@
MFH:		2020Q1
Security:	 CVE-2019-18634
2020-01-31 13:59:19 +00:00
Cy Schubert
98af306f71 Update 1.8.29 --> 1.8.30
PR:		243009
Submitted by:	cy
Approved by:	garga (maintainer)
MFH:		2020Q1
2020-01-02 18:18:39 +00:00
Renato Botelho
2025fa2bf8 security/sudo: Update to 1.8.29
Sponsored by:	Rubicon Communications, LLC (Netgate)
2019-10-29 18:42:28 +00:00
Renato Botelho
dc3158e0ca security/sudo: Fix wrong version added in r514607 using PORTVERSION
Reported by:	Herbert J. Skuhra <herbert@gojira.at>
Sponsored by:	Rubicon Communications, LLC (Netgate)
2019-10-16 18:52:21 +00:00
Renato Botelho
80e16ebdf1 security/sudo: Update to 1.8.28p1
MFH:		2019Q4
Sponsored by:	Rubicon Communications, LLC (Netgate)
2019-10-16 18:37:52 +00:00
Renato Botelho
7ecf426757 security/sudo: Update to 1.8.28
Sponsored by:	Rubicon Communications, LLC (Netgate)
2019-10-14 16:46:28 +00:00
Renato Botelho
ad971af443 security/sudo: Fix listpw=never
When listpw=never is set, 'sudo -l' is expected to run without asking for a
password.

PR:		234756
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://bugzilla.sudo.ws/show_bug.cgi?id=869
Sponsored by:	Rubicon Communications, LLC (Netgate)
2019-01-22 13:51:16 +00:00
Cy Schubert
0470039459 Update 1.8.26 --> 1.8.27
Notable changes:

 * Fixes and clarifications to the sudo plugin documentation.

 * The sudo manuals no longer require extensive post-processing to
   hide system-specific features.  Conditionals in the roff source
   are now used instead.  This fixes corruption of the sudo manual
   on systems without BSD login classes.  Bug #861.

 * If an I/O logging plugin is configured but the plugin does not
   actually log any I/O, sudo will no longer force the command to
   be run in a pseudo-tty.

 * The fix for bug #843 in sudo 1.8.24 was incomplete.  If the
   user's password was expired or needed to be updated, but no sudo
   password was required, the PAM handle was freed too early,
   resulting in a failure when processing PAM session modules.

 * In visudo, it is now possible to specify the path to sudoers
   without using the -f option.  Bug #864.

 * Fixed a bug introduced in sudo 1.8.22 where the utmp (or utmpx)
   file would not be updated when a command was run in a pseudo-tty.
   Bug #865.

 * Sudo now sets the silent flag when opening the PAM session except
   when running a shell via "sudo -s" or "sudo -i".  This prevents
   the pam_lastlog module from printing the last login information
   for each sudo command.  Bug #867.

PR:		234904
Submitted by:	cy@
Approved by:	garga@
MFH:		2019Q1
2019-01-14 12:51:59 +00:00
Renato Botelho
36a10e45fc security/sudo: Update to 1.8.26
PR:		233206 (based on)
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-11-14 15:33:03 +00:00
Renato Botelho
d6413c83e4 Update security/sudo to 1.8.25p1
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-09-13 16:49:51 +00:00
Renato Botelho
4b6c77202a security/sudo: Update to 1.8.25
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-09-04 11:42:58 +00:00
Renato Botelho
51a00331b2 security/sudo: Update to 1.8.24
PR:		230739
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-08-20 14:23:52 +00:00
Renato Botelho
ec99e38053 Add --rundir definition to CONFIGURE_ARGS to make sure configure script uses
/var/run/sudo. Without it, on a system that has /run directory, configure
will by default define rundir to /run/sudo

Reported by:	Walter Schwarzenfeld <w.schwarzenfeld@utanet.at>
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-05-03 18:57:15 +00:00
Renato Botelho
6b23a42e04 Fix PLIST without LDAP
PR:		227926
Reported by:	O. Hartmann
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-05-03 12:36:26 +00:00
Renato Botelho
dadeaf26c2 Update security/sudo to 1.8.23
PR:		227900
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-05-02 13:09:38 +00:00
Renato Botelho
f01f10327d Add a new version of the patch committed in r468197 that fixes a regression
introduced by that version.

PR:		223587
Submitted by:	Todd C. Miller <Todd.Miller@sudo.ws>
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://bugzilla.sudo.ws/show_bug.cgi?id=831
MFH:		2018Q2
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-04-24 16:52:48 +00:00
Renato Botelho
7f9b035326 Add a patch to fix cryptographic digest in command specification for shell
scripts and other interpreted files. Error happens because fexecve() requires
/dev/fd to be mounted. This patch detects if /dev/fd/N exists before attempt
to use fexecve and workaround the issue.

PR:		223587
Submitted by:	Todd C. Miller <Todd.Miller@sudo.ws>
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://bugzilla.sudo.ws/show_bug.cgi?id=831
MFH:		2018Q2
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-04-24 11:07:12 +00:00
Renato Botelho
6c726e9d8c Last commit was supposed to be a local change for testing. Patch was not yet
ready for production. Reverting it for now.
2018-04-23 18:43:44 +00:00
Renato Botelho
1301938ab3 Add a patch to fix cryptographic digest in command specification for shell
scripts and other interpreted files. Error happens because fexecve() requires
/dev/fd to be mounted. This patch detects if /dev/fd/N exists before attempt
to use fexecve and workaround the issue.

PR:		223587
Submitted by:	Todd C. Miller <Todd.Miller@sudo.ws>
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://www.sudo.ws/repos/sudo/rev/30f7c5d64104
MFH:		2018Q2
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-04-23 18:40:50 +00:00
Renato Botelho
1c169d7fc7 - Add new options to security/sudo to make it possible to build it with
kerberos support.
- Bump PORTREVISION

PR:		225498
Submitted by:	Cullum Smith <cullum@c0ffee.net>
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-04-19 13:11:34 +00:00
Renato Botelho
9ba9264b6b Add an example of prompt that shows which user password is being expected.
It's useful when targetpw option is set to avoid confusion. PORTREVISION was
not bumped because a new commit is going to happen soon with one more change
and it will bump it.

PR:		221264
Submitted by:	Rebecca Cran <rebecca@bluestop.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-04-19 13:09:58 +00:00
Renato Botelho
9d5a4ab439 Update security/sudo to 1.8.22
Sponsored by:	Rubicon Communications, LLC (Netgate)
2018-01-17 15:07:51 +00:00
Brad Davis
0c8c7cd2b0 Pull in an upstream patch for security/sudo to not coredump if the hostname is not set.
PR:		222510
Approved by:	garga
2017-11-13 16:58:14 +00:00
Renato Botelho
c7fc4a2213 Update security/sudo to 1.8.21p2
PR:		222194
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
2017-09-18 16:47:40 +00:00
Renato Botelho
c5beee7821 Update security/sudo to 1.8.21p1 2017-09-05 17:15:29 +00:00
Renato Botelho
ce8d8102a0 - Update security/sudo to 1.8.21
PR:		221874
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
		bdrewery (SIGINFO fix)
Sponsored by:	Rubicon Communications, LLC (Netgate)
2017-08-29 10:30:33 +00:00
Bryan Drewery
3adb452fd9 - Fix sudo sending a 2nd SIGINFO on ^T to processes, which is already
handled by the kernel sending it to the entire controlling terminal's
  process group.
  - This fixes ^T with 'sudo poudriere ...' showing a status log twice.
  - This is intended to be upstreamed.

Approved by:	garga (maintainer)
Tested by:	swills, bdrewery
Reviewed/Discussed with:	kib
Reported by:	kwm, swills, bapt, dim, kib, many others
MFH:		2017Q3
2017-08-11 18:32:57 +00:00
Renato Botelho
f2988cfe1d Fix the way ${PREFIX}/etc/sudoers.d is handled removing the workaround added in
r260609 and using @dir

PR:		220234
Submitted by:	Jose Luis Duran <jlduran@gmail.com>
Sponsored by:	Rubicon Communications (Netgate)
2017-06-27 13:49:53 +00:00
Mathieu Arnold
b9cb22153d Starting in 1.8.20, the sample sudoers file has been installed twice,
once as sudoers.sample and once as sudoers.dist. Remove one of them.

PR:		219708
Submitted by:	mat
Approved by:	maintainer timeout
Sponsored by:	Absolight
2017-06-15 11:01:34 +00:00
Renato Botelho
d6fd754a7f Update security/sudo to 1.8.20p2
Sponsored by:	Rubicon Communications (Netgate)
2017-06-10 14:10:26 +00:00
Cy Schubert
18cb1bab42 Update 1.8.20 --> 1.8.20p1
This release fixes a potential security issue that may allow a user to
bypass the "tty_ticket" constraints or overwrite an arbitrary file.
The issue is reported to only be present on Linux systems but I don't
think it hurts to update the FreeBSD port at this time.

Approved by:		garga@ (maintainer)
MFH:			2017Q2
Differential Revision:	D10997
2017-05-31 12:42:02 +00:00
Renato Botelho
ca7395b72b Update security/sudo to 1.8.20
Sponsored by:	Rubicon Communications (Netgate)
2017-05-11 17:03:08 +00:00
Cy Schubert
6c6846afca Update 1.8.19p1 --> 1.8.19p2.
Major changes between sudo 1.8.19p2 and 1.8.19p1:

 * Fixed a crash in visudo introduced in sudo 1.8.9 when an IP address
   or network is used in a host-based Defaults entry.  Bug #766

 * Added a missing check for the ignore_iolog_errors flag when
   the sudoers plugin generates the I/O log file path name.

 * Fixed a typo in sudo's vsyslog() replacement that resulted in
   garbage being logged to syslog.

Approved by:	garga (maintainer)
MFH:		2917Q1
Differential Revision:	D9181
2017-01-16 13:38:38 +00:00
Cy Schubert
7e5d948e38 Update 1.8.19 --> 1.8.19p1
As per sudo announcement:

 * Fixed a bug introduced in sudo 1.8.19 that resulted in the wrong
   syslog priority and facility being used.

PR:		215447
Submitted by:	myself (in pr 215447)
Approved by:	garga (maintainer)
2016-12-20 21:11:07 +00:00
Cy Schubert
57e9d95647 Update 1.8.18p1 --> 1.8.19.
PR:		215434
Submitted by:	cy
Reviewed by:	garga (maintainer)
2016-12-19 23:59:23 +00:00
Cy Schubert
c74d8e4756 Update 1.8.18 --> 1.8.18p1
From the sudo announcment:

Depending on your sudoers file configuration, the bug fixed in
1.8.18p1 may have a security impact.  For more information, see
https://www.sudo.ws/alerts/noexec_wordexp.html

Approved by:		garga@ (maintainer)
MFH:			2016Q4
Differential Revision:	D8363
2016-10-28 12:16:32 +00:00
Renato Botelho
4f642cfeee Update security/sudo to 1.8.18
Sponsored by:	Rubicon Communications (Netgate)
2016-09-21 13:45:45 +00:00
Renato Botelho
89ace70eb9 Update security/sudo to 1.8.17p1
MFH:		2016Q2
Sponsored by:	Rubicon Communications (Netgate)
2016-06-23 00:55:19 +00:00
Cy Schubert
becd50be04 Update 1.8.16 --> 1.8.17
PR:		210407
Submitted by:	cy@
Approved by:	garga@
MFH:		2016Q2
2016-06-20 14:03:03 +00:00
Renato Botelho
050bdc9f2f Add a patch to fix sudo bug #743 that causes a bug where it dereference
a NULL pointer when it looks up a negative cached entry which is stored
as a NULL passwd or group struct pointer

PR:		208198
Submitted by:	Fredrik Eriksson <fredrik.eriksson@loopia.se>
Obtained from:	https://www.sudo.ws/repos/sudo/rev/1d13341d53ec
Sponsored by:	Rubicon Communications (Netgate)
2016-06-11 20:39:38 +00:00
Renato Botelho
eb1a24b70d - Stop forcing -lssp_nonshared since libc already include it in every link.
It should fix build when world is built with WITHOUT_SSP
- Bump PORTREVISION

PR:		203380
Submitted by:	Kenneth Salerno <kennethsalerno@yahoo.com>
Sponsored by:	Rubicon Communications (Netgate)
2016-06-11 20:11:14 +00:00
Mathieu Arnold
597afc47ba Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.
With hat:	portmgr
Sponsored by:	Absolight
2016-04-01 14:25:16 +00:00
Renato Botelho
a0d598d98d - Update security/sudo to 1.8.16 [1]
- Pet portlint using (pre|post)[un]exec items in plist

PR:		208111 [1]
Submitted by:	cy [1]
Sponsored by:	Rubicon Communications (Netgate)
2016-03-18 12:15:26 +00:00
Renato Botelho
5ebc099a79 - Update security/sudo to 1.8.15
- Remove patch-plugins__sudoers__Makefile.in, unnecessary on stagedir days
- Remove patch-plugins__sudoers__audit.c, sudo_gettext.h is already included
  by sudoers.h
- Rework patch-plugins__sudoers__sudoers.in to replace pkg_* utilities by
  pkg on message
2015-11-03 09:44:23 +00:00
Renato Botelho
70d00a6e91 Update to 1.8.14p3 2015-07-22 13:34:15 +00:00
Renato Botelho
8c90f7f8fa Update to 1.8.14p2 2015-07-21 12:28:17 +00:00
Renato Botelho
bfb16b32ec - Fix installation with DOCS broken by my last commit
- Bump PORTREVISION

Pointyhat to:	garga
2015-07-20 13:13:01 +00:00