Bug#1019428: Please, fix sudo to cope with libgcrypt changes

2022-09-20 Thread Todd C. Miller
I believe this is fixed by: https://www.sudo.ws/repos/sudo/rev/ebf9a6477d5d I was able to reproduce the issue by running "make check" and checking syslog. - todd

Bug#1003304: debsigs uses a predictable /tmp directory name

2022-01-07 Thread Todd C. Miller
of packages debsigs depends on: ii binutils 2.35.2-2 ii gnupg 2.2.27-2 ii perl 5.32.1-4+deb11u2 Versions of packages debsigs recommends: ii debsig-verify 0.23+b2 debsigs suggests no packages. -- no debconf information commit 9cd7c457001ec6b10fc77ae370046583511c6d24 Author: Todd C.

Bug#1003302: debsigs: Do not hard-code the path to gpg.

2022-01-07 Thread Todd C. Miller
b2dbd703b1b40d6e616b2246a84ef3b53e578497 Author: Todd C. Miller Date: Sun Sep 26 19:51:18 2021 -0600 Do not hard-code the path to gpg. There's no need to do this as perl will use execvp() which searches PATH. diff --git a/debsigs b/debsigs index 25b5d44..dc12b02 100644 --- a/debsigs +++ b/debsigs @@ -100,7 +100,7 @@ sub

Bug#1003303: debsigs: Implement the -g/--gpgopts option

2022-01-07 Thread Todd C. Miller
recommends: ii debsig-verify 0.23+b2 debsigs suggests no packages. -- no debconf information commit 5311625df0d485e16fd674b452c5ecf2b0df160f Author: Todd C. Miller Date: Mon Sep 27 08:37:28 2021 -0600 Pass options from -g/--gpgops to gpg when signing. Multiple options may

Bug#988369: debsigs --verify not implemented

2022-01-06 Thread Todd C. Miller
I have implemented verify mode. There is a merge request at GitLab: https://gitlab.com/debsigs/debsigs/-/merge_requests/5 - todd

Bug#734752: sudo, pam_limits, users with same UID

2020-05-11 Thread Todd C. Miller
This has been fixed in sudo 1.9.0: https://www.sudo.ws/repos/sudo/rev/b45608f29a02

Bug#571621: sudoers grammar doesn't show that sudoedit takes an argument

2020-05-11 Thread Todd C. Miller
In sudo 1.9.0, the sudoers grammar in the manual now indicates that "sudoedit" requires one or more arguments. - todd

Bug#669687: sudo does not call pam_end on authorization failure

2020-05-11 Thread Todd C. Miller
Sudo 1.9.0 includes a fix for this: www.sudo.ws/repos/sudo/rev/98cb9d98f547

Bug#805833: listpw

2020-05-07 Thread Todd C. Miller
This was fixed in sudo 1.8.20. - todd

Bug#783582: sudo german translation typo

2020-05-07 Thread Todd C. Miller
This was fixed in the following commit on 2014-09-17: https://www.sudo.ws/repos/sudo/rev/588c41d2eab5

Bug#942680: [Pkg-shadow-devel] Bug#942680: passwd: vipw does not resume properly when suspended

2019-11-04 Thread Todd C. Miller
On Sat, 26 Oct 2019 07:49:33 -0500, "Serge E. Hallyn" wrote: > second option sounds nicer but sure is a lot more code. So I'm > leaning towards the first. Do you mind creating a github issue > at github.com/shadow-maint/shadow for this, or would you prefer that > I do it? I opened a github

Bug#942680: passwd: vipw does not resume properly when suspended

2019-10-19 Thread Todd C. Miller
Package: passwd Version: 1:4.5-1.1 Severity: normal Tags: patch Dear Maintainer, * What led up to the situation? If vipw is suspended (e.g. via control-Z) and then resumed, it often gets immediately suspended. This is easier to reproduce on a multi-core system. * What

Bug#640671: sudoers gid: Operation not permitted

2011-10-04 Thread Todd C. Miller
This bug is being tracked at: http://www.gratisoft.us/bugzilla/show_bug.cgi?id=511 The problem is that ldap_initialize() is modifying the effective uid. Before the call to ldap_start_tls_s(), the euid is 0, aftter ldap_start_tls_s(), the effective and saved uids are the same as the real uid.

Bug#640671: sudoers gid: Operation not permitted

2011-10-04 Thread Todd C. Miller
It looks like the root of the problem is in libgcrypt, see: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566351 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#614728: sudo: unsafe SIGCHLD catching code

2011-09-17 Thread Todd C. Miller
This was fixed in sudo 1.7.5; sudo now uses the self pipe trick which solves both problems. - todd -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#589585: sudo: -v cannot be combined with -n

2011-09-17 Thread Todd C. Miller
This will be fixed in sudo 1.7.8. The problem does not manifest in the sudo 1.8.x branch. - todd -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#404256: sudo -k and sudo -K should ignore timestamp

2011-09-17 Thread Todd C. Miller
This bug was fixed in sudo 1.7.4p1. - todd -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#640304: sudo received signal SIGBUS, Bus error

2011-09-16 Thread Todd C. Miller
A bus error is usually an alignment problem. I can see how this could happen on 64-bit machines with strict alignment requirements (such as sparc64). The following patch fixes the problem for me. It will be part of a sudo 1.8.2p1 release. - todd diff -r d161b82321da plugins/sudoers/pwutil.c

Bug#631268: sudo-ldap does not dereference aliases

2011-09-16 Thread Todd C. Miller
Sudo does its own ldap.conf parsing and does not use the values preloaded by the OpenLDAP libraries since that also reads $HOME/.ldaprc and ./ldaprc. The actual problem is that sudo doesn't recognize the DEREF setting in ldap.conf. This will be fixed in sudo 1.8.3. Very old versions of sudo did

Bug#462445: sudoers bugs from debian

2008-04-03 Thread Todd C. Miller
In message [EMAIL PROTECTED] so spake Didier Raboud (didier): I have a bug that I think is similar to that one. While using libpam-fprint with this in /etc/pam.d/common-auth authsufficient pam_fprint.so authrequiredpam_unix.so nullok_secure This is what I

Bug#469526: [sudo-users] Bug#469526: Sudo: Support 'mailfrom' variable in /etc/sudoers.

2008-03-05 Thread Todd C. Miller
In message [EMAIL PROTECTED] so spake Justin Pryzby (justinpryzby): The following feature request was received from a Debian user. http://bugs.debian.org./469526 The sudo() configuration file /etc/sudoers should accept a mailfrom variable to specify the From: header for