Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package sudo for openSUSE:Factory checked in 
at 2021-12-08 22:08:26
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sudo (Old)
 and      /work/SRC/openSUSE:Factory/.sudo.new.31177 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sudo"

Wed Dec  8 22:08:26 2021 rev:126 rq:935849 version:1.9.8p2

Changes:
--------
--- /work/SRC/openSUSE:Factory/sudo/sudo.changes        2021-08-23 
10:07:49.412270630 +0200
+++ /work/SRC/openSUSE:Factory/.sudo.new.31177/sudo.changes     2021-12-08 
22:08:32.562850950 +0100
@@ -1,0 +2,77 @@
+Wed Sep 22 12:27:51 UTC 2021 - Kristyna Streitova <kstreit...@suse.com>
+
+- update to 1.9.8p2
+  * Fixed a potential out-of-bounds read with "sudo -i" when the
+    target user's shell is bash.  This is a regression introduced
+    in sudo 1.9.8.  Bug #998.
+  * sudo_logsrvd now only sends a log ID for first command of a session.
+    There is no need to send the log ID for each sub-command.
+  * Fixed a few minor memory leaks in intercept mode.
+  * Fixed a problem with sudo_logsrvd in relay mode if "store_first"
+    was enabled when handling sub-commands.  A new zero-length journal
+    file was created for each sub-command instead of simply using
+    the existing journal file.
+
+- update to 1.9.8p1
+  * Fixed support for passing a prompt (sudo -p) or a login class
+    (sudo -l) on the command line.  This is a regression introduced
+    in sudo 1.9.8.  Bug #993.
+  * Fixed a crash with "sudo ALL" rules in the LDAP and SSSD back-ends.
+    This is a regression introduced in sudo 1.9.8.  Bug #994.
+  * Fixed a compilation error when the --enable-static-sudoers configure
+    option was specified.  This is a regression introduced in sudo
+    1.9.8 caused by a symbol clash with the intercept and log server
+    protobuf functions.
+  * It is now possible to transparently intercepting sub-commands
+    executed by the original command run via sudo.  Intercept support
+    is implemented using LD_PRELOAD (or the equivalent supported by
+    the system) and so has some limitations.  The two main limitations
+    are that only dynamic executables are supported and only the
+    execl, execle, execlp, execv, execve, execvp, and execvpe library
+    functions are currently intercepted. Its main use case is to
+    support restricting privileged shells run via sudo.
+    To support this, there is a new "intercept" Defaults setting and
+    an INTERCEPT command tag that can be used in sudoers.  For example:
+      Cmnd_Alias SHELLS=/bin/bash, /bin/sh, /bin/csh, /bin/ksh, /bin/zsh
+      Defaults!SHELLS intercept
+    would cause sudo to run the listed shells in intercept mode.
+    This can also be set on a per-rule basis.  For example:
+      Cmnd_Alias SHELLS=/bin/bash, /bin/sh, /bin/csh, /bin/ksh, /bin/zsh
+      chuck ALL = INTERCEPT: SHELLS
+    would only apply intercept mode to user "chuck" when running one
+    of the listed shells.
+    In intercept mode, sudo will not prompt for a password before
+    running a sub-command and will not allow a set-user-ID or
+    set-group-ID program to be run by default.  The new
+    intercept_authenticate and intercept_allow_setid sudoers settings
+    can be used to change this behavior.
+  * The new "log_subcmds" sudoers setting can be used to log additional
+    commands run in a privileged shell.  It uses the same mechanism as
+    the intercept support described above and has the same limitations.
+  * The new "log_exit_status" sudoers setting can be used to log
+    the exit status commands run via sudo.  This is also a corresponding
+    "log_exit" setting in the sudo_logsrvd.conf eventlog stanza.
+  * Support for logging sudo_logsrvd errors via syslog or to a file.
+    Previously, most sudo_logsrvd errors were only visible in the
+    debug log.
+  * Better diagnostics when there is a TLS certificate validation error.
+  * Using the "+=" or "-=" operators in a Defaults setting that takes
+    a string, not a list, now produces a warning from sudo and a
+    syntax error from inside visudo.
+  * Fixed a bug where the "iolog_mode" setting in sudoers and sudo_logsrvd
+    had no effect when creating I/O log parent directories if the I/O log
+    file name ended with the string "XXXXXX".
+  * Fixed a bug in the sudoers custom prompt code where the size
+    parameter that was passed to the strlcpy() function was incorrect.
+    No overflow was possible since the correct amount of memory was
+    already pre-allocated.
+  * The mksigname and mksiglist helper programs are now built with
+    the host compiler, not the target compiler, when cross-compiling.
+    Bug #989.
+  * Fixed compilation error when the --enable-static-sudoers configure
+    option was specified.  This was due to a typo introduced in sudo
+    1.9.7.  GitHub PR #113.
+
+- pack /usr/libexec/sudo/sudo/sudo_intercept.so
+
+-------------------------------------------------------------------
@@ -48,0 +126,5 @@
+
+-------------------------------------------------------------------
+Mon Jul 12 16:39:24 UTC 2021 - Yaroslav Kurlaev <yaroslav.kurl...@gmail.com>
+
+- Fix commented out "Defaults env_keep" in sudo-sudoers.patch

Old:
----
  sudo-1.9.7p2.tar.gz
  sudo-1.9.7p2.tar.gz.sig

New:
----
  sudo-1.9.8p2.tar.gz
  sudo-1.9.8p2.tar.gz.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sudo.spec ++++++
--- /var/tmp/diff_new_pack.snZn2N/_old  2021-12-08 22:08:33.266851280 +0100
+++ /var/tmp/diff_new_pack.snZn2N/_new  2021-12-08 22:08:33.270851282 +0100
@@ -22,7 +22,7 @@
 %define use_usretc 1
 %endif
 Name:           sudo
-Version:        1.9.7p2
+Version:        1.9.8p2
 Release:        0
 Summary:        Execute some commands as root
 License:        ISC
@@ -231,6 +231,7 @@
 %{_libexecdir}/%{name}/%{name}/system_group.so
 %{_libexecdir}/%{name}/%{name}/audit_json.so
 %{_libexecdir}/%{name}/%{name}/sample_approval.so
+%{_libexecdir}/%{name}/%{name}/sudo_intercept.so
 %{_libexecdir}/%{name}/libsudo_util.so.*
 %attr(0711,root,root) %dir %ghost %{_localstatedir}/lib/%{name}
 %attr(0700,root,root) %dir %ghost %{_localstatedir}/lib/%{name}/ts

++++++ sudo-1.9.7p2.tar.gz -> sudo-1.9.8p2.tar.gz ++++++
++++ 87336 lines of diff (skipped)

++++++ sudo-sudoers.patch ++++++
--- /var/tmp/diff_new_pack.snZn2N/_old  2021-12-08 22:08:33.926851591 +0100
+++ /var/tmp/diff_new_pack.snZn2N/_new  2021-12-08 22:08:33.926851591 +0100
@@ -42,7 +42,7 @@
 +## Comment out the preceding line and uncomment the following one if you need
 +## to use special input methods. This may allow users to compromise the root
 +## account if they are allowed to run commands without authentication.
-+#Defaults env_keep = "LANG LC_ADDRESS LC_CTYPE LC_COLLATE LC_IDENTIFICATION 
LC_MEASUREMENT LC_MESSAGES LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE 
LC_TIME LC_ALL LANGUAGE LINGUAS XDG_SESSION_COOKIE"
++#Defaults env_keep = "LANG LC_ADDRESS LC_CTYPE LC_COLLATE LC_IDENTIFICATION 
LC_MEASUREMENT LC_MESSAGES LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE 
LC_TIME LC_ALL LANGUAGE LINGUAS XDG_SESSION_COOKIE XMODIFIERS GTK_IM_MODULE 
QT_IM_MODULE QT_IM_SWITCHER"
 +
 +## Do not insult users when they enter an incorrect password.
 +Defaults !insults

Reply via email to