Hello community,

here is the log from the commit of package sudo for openSUSE:Factory checked in 
at 2013-10-08 20:35:01
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sudo (Old)
 and      /work/SRC/openSUSE:Factory/.sudo.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sudo"

Changes:
--------
--- /work/SRC/openSUSE:Factory/sudo/sudo.changes        2013-07-16 
07:39:32.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.sudo.new/sudo.changes   2013-10-08 
20:35:02.000000000 +0200
@@ -1,0 +2,43 @@
+Tue Oct  8 09:21:18 UTC 2013 - [email protected]
+
+- update to 1.8.8
+- drop sudo-plugins-sudoers-sssd.patch (upstream)
+  * Removed a warning on PAM systems with stacked auth modules
+    where the first module on the stack does not succeed.
+  * Sudo, sudoreplay and visudo now support GNU-style long options.
+  * The -h (--host) option may now be used to specify a host name.
+    This is currently only used by the sudoers plugin in conjunction
+    with the -l (--list) option.
+  * Sudo's LDAP SASL support now works properly with Kerberos.
+    Previously, the SASL library was unable to locate the user's
+    credential cache.
+  * It is now possible to set the nproc resource limit to unlimited
+    via pam_limits on Linux (bug #565).
+  * New "pam_service" and "pam_login_service" sudoers options
+    that can be used to specify the PAM service name to use.
+  * New "pam_session" and "pam_setcred" sudoers options that
+    can be used to disable PAM session and credential support.
+  * The sudoers plugin now properly supports UIDs and GIDs
+    that are larger than 0x7fffffff on 32-bit platforms.
+  * Fixed a visudo bug introduced in sudo 1.8.7 where per-group
+    Defaults entries would cause an internal error.
+  * If the "tty_tickets" sudoers option is enabled (the default),
+    but there is no tty present, sudo will now use a ticket file
+    based on the parent process ID.  This makes it possible to support
+    the normal timeout behavior for the session.
+  * Fixed a problem running commands that change their process
+    group and then attempt to change the terminal settings when not
+    running the command in a pseudo-terminal.  Previously, the process
+    would receive SIGTTOU since it was effectively a background
+    process.  Sudo will now grant the child the controlling tty and
+    continue it when this happens.
+  * The "closefrom_override" sudoers option may now be used in
+    a command-specified Defaults entry (bug #610).
+  * Fixed visudo's -q (--quiet) flag, broken in sudo 1.8.6.
+  * Root may no longer change its SELinux role without entering
+    a password.
+  * Fixed a bug introduced in Sudo 1.8.7 where the indexes written
+    to the I/O log timing file are two greater than they should be.
+    Sudoreplay now contains a work-around to parse those files.
+
+-------------------------------------------------------------------

Old:
----
  sudo-1.8.7.tar.gz
  sudo-plugins-sudoers-sssd.patch

New:
----
  sudo-1.8.8.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sudo.spec ++++++
--- /var/tmp/diff_new_pack.8eXgAR/_old  2013-10-08 20:35:11.000000000 +0200
+++ /var/tmp/diff_new_pack.8eXgAR/_new  2013-10-08 20:35:11.000000000 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           sudo
-Version:        1.8.7
+Version:        1.8.8
 Release:        0
 Summary:        Execute some commands as root
 License:        ISC
@@ -30,7 +30,6 @@
 # PATCH-OPENSUSE: the "SUSE" branding of the default sudo config
 Patch1:         sudo-sudoers.patch
 # PATCH-FIX-UPSTREAM: fixes 64bit-portability-issue ./sssd.c:829; sent upstream
-Patch2:         sudo-plugins-sudoers-sssd.patch
 BuildRequires:  audit-devel
 BuildRequires:  groff
 BuildRequires:  libselinux-devel
@@ -61,7 +60,6 @@
 %setup -q
 %patch0 -p1 
 %patch1 -p1
-%patch2 -p1
 
 %build
 %ifarch s390 s390x %sparc

++++++ sudo-1.8.7.tar.gz -> sudo-1.8.8.tar.gz ++++++
++++ 42744 lines of diff (skipped)

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to