Commit graph

119 commits

Author SHA1 Message Date
taca
0a17064336 Update sudo package to 1.7.2p4.
Major changes between version 1.7.2p3 and 1.7.2p4:

    * Fix a bug that could allow users with permission to run sudoedit
      to run arbitrary commands.

Major changes between version 1.7.2p2 and 1.7.2p3:

    * Fix printing of entries with multiple host entries on a single line.

    * Fix use after free when sending error messages via email.

    * Use setrlimit64(), if available, instead of setrlimit() when
      setting AIX resource limits since rlim_t is 32bits.

    * Fix size arg when realloc()ing include stack.

    * Avoid a duplicate fclose() of the sudoers file.
2010-02-26 01:08:38 +00:00
zafer
4e2ea81be8 update master_sites 2010-02-09 00:05:48 +00:00
taca
7fb236bb2b Update security/sudo pacakge to 1.7.2p2.
Major changes between sudo 1.7.2p1 and 1.7.2p2:

 * Fixed a a bug where the negation operator in a Cmnd_List
   was not being honored.

 * Sudo no longer produces a parse error when #includedir references
   a directory that contains no valid filenames.

 * The sudo.man.pl and sudoers.man.pl files are now included in
   the distribution for people who wish to regenerate the man pages.

 * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos.

 * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early so
   they can be used during authentication.
2009-12-20 07:46:32 +00:00
hasso
a3f5107672 Update to 1.7.2p1.
Changes in 1.7.2p1 since 1.7.2:
===============================

* Fixed the expansion of the %h escape in #include file names introduced in
  sudo 1.7.1.

Changes in 1.7.2 since 1.7.1:
=============================

* A new #includedir directive is available in sudoers. This can be used to
  implement an /etc/sudo.d directory. Files in an includedir are not edited
  by visudo unless they contain a syntax error.
* The -g option did not work properly when only setting the group (and not
  the user). Also, in -l mode the wrong user was displayed for sudoers
  entries where only the group was allowed to be set.
* Fixed a problem with the alias checking in visudo which could prevent
  visudo from exiting.
* Sudo will now correctly parse the shell-style /etc/environment file format
  used by pam_env on Linux.
* When doing password and group database lookups, sudo will only cache an
  entry by name or by id, depending on how the entry was looked up.
  Previously, sudo would cache by both name and id from a single lookup, but
  this breaks sites that have multiple password or group database names that
  map to the same uid or gid.
* User and group names in sudoers may now be enclosed in double quotes to
  avoid having to escape special characters.
* BSM audit fixes when changing to a non-root uid.
* Experimental non-Unix group support. Currently only works with Quest
  Authorization Services and allows Active Directory groups fixes for
  Minix-3.
* For Netscape/Mozilla-derived LDAP SDKs the certificate and key paths may
  be specified as a directory or a file. However, version 5.0 of the SDK
  only appears to support using a directory (despite documentation to the
  contrary). If SSL client initialization fails and the certificate or key
  paths look like they could be default file name, strip off the last path
  element and try again.
* A setenv() compatibility fix for Linux systems, where a NULL value is
  treated the same as an empty string and the variable name is checked
  against the NULL pointer.
2009-08-02 07:39:27 +00:00
taca
1068ac3fb6 Update sudo package to 1.7.1.
pkgsrc change: add LICENSE.


What's new in Sudo 1.7.1?

 * A new Defaults option "pwfeedback" will cause sudo to provide visual
   feedback when the user is entering a password.

 * A new Defaults option "fast_glob" will cause sudo to use the fnmatch()
   function for file name globbing instead of glob().  When this option
   is enabled, sudo will not check the file system when expanding wildcards.
   This is faster but a side effect is that relative paths with wildcard
   will no longer work.

 * New BSM audit support for systems that support it such as FreeBSD
   and Mac OS X.

 * The file name specified with the #include directive may now include
   a %h escape which is expanded to the short form of hostname.

 * The -k flag may now be specified along with a command, causing the
   user's timestamp file to be ignored.

 * New support for Tivoli-based LDAP START_TLS, present in AIX.

 * New support for /etc/netsvc.conf on AIX.

 * The unused alias checks in visudo now handle the case of an alias
   referring to another alias.
2009-05-21 03:42:49 +00:00
taca
ff4641fd17 Update security/sudo package to 1.7.0.
* pkgsrc change: relax restriction to kerberos package.


What's new in Sudo 1.7.0?

 * Rewritten parser that converts sudoers into a set of data structures.
   This eliminates a number of ordering issues and makes it possible to
   apply sudoers Defaults entries before searching for the command.
   It also adds support for per-command Defaults specifications.

 * Sudoers now supports a #include facility to allow the inclusion of other
   sudoers-format files.

 * Sudo's -l (list) flag has been enhanced:
    o applicable Defaults options are now listed
    o a command argument can be specified for testing whether a user
      may run a specific command.
    o a new -U flag can be used in conjunction with "sudo -l" to allow
      root (or a user with "sudo ALL") list another user's privileges.

 * A new -g flag has been added to allow the user to specify a
   primary group to run the command as.  The sudoers syntax has been
   extended to include a group section in the Runas specification.

 * A uid may now be used anywhere a username is valid.

 * The "secure_path" run-time Defaults option has been restored.

 * Password and group data is now cached for fast lookups.

 * The file descriptor at which sudo starts closing all open files is now
   configurable via sudoers and, optionally, the command line.

 * Visudo will now warn about aliases that are defined but not used.

 * The -i and -s command line flags now take an optional command
   to be run via the shell.  Previously, the argument was passed
   to the shell as a script to run.

 * Improved LDAP support.  SASL authentication may now be used in
   conjunction when connecting to an LDAP server.  The krb5_ccname
   parameter in ldap.conf may be used to enable Kerberos.

 * Support for /etc/nsswitch.conf.  LDAP users may now use nsswitch.conf
   to specify the sudoers order.  E.g.:
	sudoers: ldap files
   to check LDAP, then /etc/sudoers.  The default is "files", even
   when LDAP support is compiled in.  This differs from sudo 1.6
   where LDAP was always consulted first.

 * Support for /etc/environment on AIX and Linux.  If sudo is run
   with the -i flag, the contents of /etc/environment are used to
   populate the new environment that is passed to the command being
   run.

 * If no terminal is available or if the new -A flag is specified,
   sudo will use a helper program to read the password if one is
   configured.  Typically, this is a graphical password prompter
   such as ssh-askpass.

 * A new Defaults option, "mailfrom" that sets the value of the
   "From:" field in the warning/error mail.  If unspecified, the
   login name of the invoking user is used.

 * A new Defaults option, "env_file" that refers to a file containing
   environment variables to be set in the command being run.

 * A new flag, -n, may be used to indicate that sudo should not
   prompt the user for a password and, instead, exit with an error
   if authentication is required.

 * If sudo needs to prompt for a password and it is unable to disable
   echo (and no askpass program is defined), it will refuse to run
   unless the "visiblepw" Defaults option has been specified.

 * Prior to version 1.7.0, hitting enter/return at the Password: prompt
   would exit sudo.  In sudo 1.7.0 and beyond, this is treated as
   an empty password.  To exit sudo, the user must press ^C or ^D
   at the prompt.

 * visudo will now check the sudoers file owner and mode in -c (check)
   mode when the -s (strict) flag is specified.
2009-02-05 13:48:12 +00:00
taca
1632781072 Update sudo package to 1.6.9p17.
660) The -i flag should imply resetting the environment, as it did in
     sudo version prior to 1.6.9.  Also, the -i and -E flags are
     mutually exclusive.

661) Fixed the configure test for dirfd() under Linux.

662) Fixed test for whether -lintl is required to link.

663) Changed how sudo handles the child process when sending mail.
     This fixes a problem on Linux with the mail_always option.

664) Fixed a problem with line continuation characters inside of
     quoted strings.
2008-06-30 15:53:41 +00:00
taca
6c7222dc28 Update security/seudo pacakge to 1.6.p16.
Major changes since Sudo 1.6.9p15:

 o There was missing whitespace before the ldap libraries in the Makefile
   for some configurations.

 o LDAPS_PORT may not be defined on older Solaris LDAP SDKs.

 o If the LDAP server could not be contacted and the user was not present
   in sudoers, a syntax error in sudoers was incorrectly reported.
2008-05-14 14:00:15 +00:00
jlam
38a70df401 Don't hardcode "0 0" for the root user and group -- use ${REAL_ROOT_USER}
and ${REAL_ROOT_GROUP} instead.  The pkginstall framework checks for
the name of the user and group, not the uid and gid, when comparing
permissions.  This fixes the following spurious warning from appearing:

    The following files are used by sudo-1.6.9p15 and have
    the wrong ownership and/or permissions:

            /usr/pkg/etc/sudoers (m=0440, o=0, g=0)
2008-04-02 15:06:07 +00:00
taca
e07592e07d Update sudo package to 1.6.9p15.
653) Fixed installation of sudo_noexec.so on AIX.

654) Updated libtool to version 1.5.26.

655) Fixed printing of default SELinux role and type in -V mode.

656) The HOME environment variable is once again preserved by default,
     as per the documentation.
2008-03-29 14:16:58 +00:00
taca
1b21c85160 Update sudo package to 1.6.9p14.
pkgsrc changes:

- Explict to depends security/heimdal package when kerberos option is
  specified.  PR pkg/37999 should be fixed.

Change:

646) Sudo will now set the nproc resource limit to unlimited on Linux
     systems to work around Linux's setuid() resource limit semantics.
     On PAM systems the resource limits will be reset by pam_limits.so
     before the command is executed.

647) SELinux support that can be used to implement role based access
     control (RBAC).  A role and (optional) type may be specified
     in sudoers or on the command line.  These are then used in the
     security context that the command is run as.

648) Fixed a Kerberos 5 compilation problem with MIT Kerberos.

Sudo 1.6.9p13 released.

649) Fixed an invalid assumption in the PAM conversation function
     introduced in version 1.6.9p9.  The conversation function may
     be called for non-password reading purposes as well.

650) Fixed freeing an uninitialized pointer in -l mode, introduced in
     version 1.6.9p13.

651) Check /etc/sudoers after LDAP even if the user was found in LDAP.
     This allows Defaults options in /etc/sudoers to take effect.

652) Add missing checks for enforcing mode in SELinux RBAC mode.

Sudo 1.6.9p14 released.
2008-03-11 15:52:51 +00:00
taca
4ed365d3bc Distribution file was changed after sudo 1.6.9p12 was released. :-(
config.h.in
	configure
	configure.in
	ldap.c

Add DIST_SUBDIR to handle this situation.

Bump PKG_REVISION.
2008-01-22 12:45:24 +00:00
taca
cd62454d80 Update sudo package to 1.6.9p12.
Changes from 1.6.9p11:

641) Added a configure check for the ber_set_option() function.

642) Fixed a compilation problem with the HP-UX K&R C compiler.

643) Revamped the Kerberos 5 ticket verification code.

644) Added support for the checkpeer ldap.conf variable for
     netscape-based LDAP SDKs.

645) Fixed a problem where an incomplete password could be echoed
     to the screen if there was a read timeout.
2008-01-21 16:38:57 +00:00
taca
5fe02749ec Update sudo package to 1.6.9p11.
637) Fixed a compilation problem on SCO related to how they
     store the high resolution timestamps in struct stat.

638) Avoid checking the passwd file group multiple times
     in the LDAP query when the user's passwd group is also
     listed in the supplemental group vector.

639) The URI specifier can now be used in ldap.conf even when
     the LDAP SDK doesn't support ldap_initialize().

640) New %p prompt escape that expands to the user whose password
     is being prompted, as specified by the rootpw, targetpw and
     runaspw sudoers flags.  Based on a diff from Patrick Schoenfeld.
2008-01-06 16:08:24 +00:00
rillig
8159318d33 Install the binaries readable for the owner, so that a package can be
created in unprivileged pkgsrc mode. PKGREVISION++
2008-01-03 23:17:47 +00:00
heinz
b55970381a Replaced outdated mirrors by working mirrors. 2007-12-30 13:42:29 +00:00
taca
dca1f5683b Update sudo pacakge to 1.6.9p10.
Major changes since Sudo 1.6.9p9:

 o Moved LDAP options into a table for simplified parsing/setting.

 o Fixed a problem with how some LDAP options were being applied.

 o Added support for connecting directly to LDAP servers via SSL/TLS
   for servers that don't support the start_tls extension.
2007-12-21 03:12:34 +00:00
taca
a208a673da sudo-1.6.9p9.tar.gz was updated now. So, introduce DIST_SUBDIR and
bump PKGREVISION.

A little bug fix seems to applied.

-rw-r--r--  1 taca  taca  578259 Dec  3 19:38 sudo-1.6.9p9.tar.gz-prev
-rw-r--r--  1 taca  taca  578262 Dec  5 00:27 sudo-1.6.9p9.tar.gz

diff -dupNr sudo-1.6.9p9-20071203/parse.c sudo-1.6.9p9/parse.c
--- sudo-1.6.9p9-20071203/parse.c	2007-11-28 08:29:59.000000000 +0900
+++ sudo-1.6.9p9/parse.c	2007-12-05 00:26:40.000000000 +0900
@@ -90,7 +90,7 @@
 #endif /* HAVE_EXTENDED_GLOB */

 #ifndef lint
-__unused static const char rcsid[] = "$Sudo: parse.c,v 1.160.2.14 2007/10/24 16:43:27 millert Exp $";
+__unused static const char rcsid[] = "$Sudo: parse.c,v 1.160.2.15 2007/12/04 15:26:40 millert Exp $";
 #endif /* lint */

 /*
@@ -202,7 +202,7 @@ sudoers_lookup(pwflag)
 		    return(VALIDATE_OK |
 			(no_passwd == TRUE ? FLAG_NOPASS : 0) |
 			(no_execve == TRUE ? FLAG_NOEXEC : 0) |
-			(setenv_ok == TRUE ? FLAG_SETENV : 0));
+			(setenv_ok >= TRUE ? FLAG_SETENV : 0));
 		} else if ((runas_matches == TRUE && cmnd_matches == FALSE) ||
 		    (runas_matches == FALSE && cmnd_matches == TRUE)) {
 		    /*
@@ -212,7 +212,7 @@ sudoers_lookup(pwflag)
 		    return(VALIDATE_NOT_OK |
 			(no_passwd == TRUE ? FLAG_NOPASS : 0) |
 			(no_execve == TRUE ? FLAG_NOEXEC : 0) |
-			(setenv_ok == TRUE ? FLAG_SETENV : 0));
+			(setenv_ok >= TRUE ? FLAG_SETENV : 0));
 		}
 	    }
 	    top--;
diff -dupNr sudo-1.6.9p9-20071203/sudo.c sudo-1.6.9p9/sudo.c
--- sudo-1.6.9p9-20071203/sudo.c	2007-12-03 02:13:52.000000000 +0900
+++ sudo-1.6.9p9/sudo.c	2007-12-04 01:12:03.000000000 +0900
@@ -730,8 +730,10 @@ parse_args(argc, argv)

     while (NewArgc > 0) {
 	if (NewArgv[0][0] == '-') {
-	    if (NewArgv[0][1] != '\0' && NewArgv[0][2] != '\0')
+	    if (NewArgv[0][1] != '\0' && NewArgv[0][2] != '\0') {
 		warnx("please use single character options");
+		usage(1);
+	    }

 	    switch (NewArgv[0][1]) {
 		case 'p':
2007-12-05 10:07:14 +00:00
taca
498d04a83c Update sudo package to 1.6.9p9.
Major changes since Sudo 1.6.9p8:

 o The ALL command in sudoers now implies SETENV permissions.

 o The command search is now performed using the target user's
   auxiliary group vector, not just the target's primary group.

 o When determining if the PAM prompt is the default "Password: ",
   compare the localized version if possible.

 o New passprompt_override option in sudoers to cause sudo's prompt
   to be used in all cases.  Also set when the -p flag is used.
2007-12-05 04:14:42 +00:00
taca
2628c96443 Update sudo package to 1.6.9p8.
Major changes since Sudo 1.6.9p7:

 o Fixed a bug where a sudoers entry with no runas user specified
   was treated differently from a line with the default runas user
   explicitly specified.
2007-11-04 12:07:24 +00:00
taca
9685596eea Update sudo package to 1.6.9p7.
pkgsrc change: added DESTDIR support.


Major changes since Sudo 1.6.9p6:

 o Reverted back to to using TCSAFLUSH instead of TCSADRAIN when
   turning off echo during password reading.

 o Fixed a configure bug that was preventing the addition of -lutil for
   login.conf support on FreeBSD and NetBSD.

 o Added a configure check for struct in6_addr since some systems
   define AF_INET6 but have no real IPv6 support.
2007-10-28 02:05:44 +00:00
taca
8a81fb76e1 Update sudo package to 1.6.9p6.
Major changes since Sudo 1.6.9p5:

 o Worked around bugs in the session support of some PAM implementations.
   The full tty path is now passed to PAM as well.

 o Sudo now only prints the password prompt if the process is in the
   foreground.

 o inttypes.h is now included when appropriate if it is present.

 o Simplified alias allocation in the parser.
2007-10-10 00:08:24 +00:00
taca
e669d33f13 Update sudo pacakge to 1.6.9p5.
617) Fixed a bug in the IP address matching introduced by the IPV6 merge.

618) For "visudo -f file" we now use the permissions of the original file
     and not the hard-coded sudoers owner/group/mode.  This makes
     it possible to use visudo with a revision control system.

619) Fixed sudoedit when used on a non-existent file.

620) Regenerated configure using autoconf 2.6.1 and libtool 1.5.24.

621) Groups and netgroups are now valid in an LDAP sudoRunas statement.
2007-09-09 12:54:36 +00:00
taca
b55392c988 Update sudo package to 1.6.9p4.
pkgsrc change:

Make these options mutual exclusive: kerberos pam skey.
(Really, combinations of kerberos and pam, pam and skey are conflicts.)

CHANGES:

609) Worked around a bug ins some PAM implementations that caused a crash
     when no tty was present.

610) Fixed a crash on some platforms in the error logging function.

611) Documentation improvements.

Sudo 1.6.9p1 released.

612) Fixed updating of the saved environment when the environ pointer
     gets changed out from underneath us.

Sudo 1.6.9p2 released.

613) Fixed a bug related to supplemental group matching introduced
     in 1.6.9.

Sudo 1.6.9p3 released.

614) Added IPv6 support from YOSHIFUJI Hideaki.

615) Fixed sudo_noexec installation path.

616) Fixed a K&R compilation error.

Sudo 1.6.9p4 released.
2007-08-18 15:09:11 +00:00
gdt
d7922fde3a Fix location of old distfiles in MASTER_SITE (s/old/OLD/). 2007-07-27 17:28:48 +00:00
jlam
ea2890b4d2 Remove a redundant PKGNAME definition (which matches DISTNAME), and add
a fetch location for old distfiles so that we don't need to always keep
this package at the latest release.
2007-07-26 19:34:12 +00:00
tls
e45a7ebbb0 Update sudo to 1.6.9. We don't take the new default of PAM and no other
authentication; that can be enabled by adding pam to the package options
if users desire.
2007-07-23 16:38:36 +00:00
jlam
a6f8cbe795 pkgsrc basically follows the BSD man page hierarchy. Install the su
and visudo manpages in man/man1, and the sudoers manpage in man/man5.
Remove the platform-specific PLISTs that only differed in the location
of the man pages.

Bump the PKGREVISION to 5.
2007-07-04 20:37:50 +00:00
tls
d4bffa6d45 On some hosts, this package's configure script fails to detech Heimdal
(in fact, it's not clear that there is a good way to do so).  The resulting
configuration works fine *except* if it encounters a host that has 3DES
but no DES service keys in its keytab.

Fix this by explicitly passing 0 ("default enctype") to Kerberos.
2007-07-02 06:04:01 +00:00
tls
36ca7970b3 Fix privilege-escalation vulnerability with PKG_OPTIONS.sudo=kerberos:
cleanse environment of variables that alter behavior of Kerberos library
so the user can't override the default keytab location, and do *not*
ignore missing keytab errors.  Prevents root compromise via spoofed KDC
on systems with Kerberos libraries but no host key in keytab, no keytab,
or keytab overidden via environment.

Don't insist that the keytab key be DES -- some Kerberos sites are 3DES/AES
only.

Somewhat less invasive than the fix Todd incorporated into the 1.6.9 branch
of sudo (presently beta) but equivalent (though not as clean).
2007-06-25 09:53:42 +00:00
rillig
bec1d82f20 bin/sudo is set-uid root. PKGREVISION++ 2007-03-13 09:46:00 +00:00
reed
da04fb6a7e Make sudo use VARBASE.
Always use "man" instead of catpages.

Make sure "run" directory is precreated, so you don't get:
/usr/bin/sudo sudo: can't mkdir /var/run/sudo: No such file or directory

Bump PKGREVISION.

Okayed by maintainer back in December. The only concern was
that /var/run may not be for all platforms, but this is same
as other packages to (not specific to sudo).
2006-06-14 00:06:27 +00:00
adrianp
91f591c243 Add PYTHONINSPECT to the list of environment variables to clean
Fix for http://secunia.com/advisories/18358/
Bump to nb1
2006-01-15 11:32:06 +00:00
cube
fa24fed649 Sync with latest sudo release (1.6.8pl12). The actual diff is one line
long.  PR#32378 by Stefan Krüger.

Changes:
     Added PS4 and SHELLOPTS to the list of variables to remove from
     the environment.     (Already in pkgsrc)
     Added JAVA_TOOL_OPTIONS to the list of variables to remove from
     the environment.
     Added PERLLIB, PERL5LIB and PERL5OPT to the list of variables to
     remove from the environment.     (Already in pkgsrc)
2006-01-09 15:53:40 +00:00
jlam
dc9594e09d Remove USE_PKGINSTALL from pkgsrc now that mk/install/pkginstall.mk
automatically detects whether we want the pkginstall machinery to be
used by the package Makefile.
2005-12-29 06:21:30 +00:00
rillig
579e977969 Ran "pkglint --autofix", which corrected some of the quoting issues in
CONFIGURE_ARGS.
2005-12-05 23:55:01 +00:00
adrianp
8382f588a5 Update sudo to nb2 to address the recent secuity issue:
- http://www.sudo.ws/sudo/alerts/perl_env.html

- Add "PERLLIB", "PERL5LIB" and the "PERL5OPT" to the list of
  environment variables to be cleaned.
2005-11-12 14:17:45 +00:00
cube
b62e58b21b Add a patch for CVE-2005-2959: SHELLOPTS and PS4 have to be cleared from
the environment before letting the user execute bash scripts.

Bump PKGREVISION.

From Debian.
2005-10-25 22:05:55 +00:00
rillig
44f4f508db Fixed a pkglint warning. 2005-10-07 12:53:02 +00:00
jlam
7fcf75bb22 Security update for security/sudo to 1.6.8p9. Changes from version
1.6.8p7 include:

562) Fixed noexec functionality on Linux.

564) Fixed a bug that prevented Heimdal authentication from working.

566) A sudoers entry with sudo ALL no longer overwrites the value of
     safe_cmnd.  This fixes the privilege escalation vulnerability
     noted in http://www.courtesan.com/sudo/alerts/path_race.html
2005-06-20 20:11:11 +00:00
tv
f816d81489 Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. 2005-04-11 21:44:48 +00:00
cube
f51a99f68c Update to 1.6.8pl7.
Changes:

557) Added a set of missing braces needed for MacOS X / Darwin.
558) Define LDAP_OPT_SUCCESS for those without it.
559) Warn if the user tries to use the -u option when not running a command.
560) Better PAM error handling and messages.
561) Fixed setting of $USER when env_reset is enabled.
2005-03-30 12:08:15 +00:00
kim
0dfef04fbd Remove "--disable-setreuid" -- the configure scripts seems to have
adequate logic for determining when to use setreuid.

This makes sudoedit work on NetBSD again.

Closes PR pkg/28998
2005-01-30 21:36:53 +00:00
jlam
02e7a05425 Allow building sudo without S/Key support on NetBSD. Patch from
PR pkg/28743 by Jukka Salmi with minor changes by me.
2004-12-22 04:36:32 +00:00
xtraeme
a431aa7332 Update to 1.6.8pl5.
Changes:

o Added a configure check for systems with a 2-argument version of
  timespecsub (like BSD/OS).
o Added stub struct defintions to sudo.h to quiet compiler warnings
  on some systems.
o In sudoers Defaults lines, tuples like "lecture" may now be used
  without a value, restoring their old boolean-like nature.
o Invalid values for a tuple are now handled correctly.
2004-11-30 00:27:10 +00:00
cube
590ccb09f2 sudo is nominated for crapware of the year. Now at version 1.6.8pl4!
Just as for pl2, changes are about environment sanitizing, meaning there
are possible security issues with current versions.

Changes:

550) The CDPATH variable is now stripped from the environment passed
     to the program to be executed.
551) Fix temp file generation on systems where the _PATH_VARTMP macro
     lacks a trailing slash.
552) The KRB5CCNAME environment variable is preserved during sudo
     execution for password lookups that use GSSAPI.
2004-11-26 16:23:57 +00:00
jlam
e545d1e43c Honor PKG_SYSCONFDIR by looking for the LDAP configuration file in
${PKG_SYSCONFDIR}/ldap.conf (by default, /usr/pkg/etc/ldap.conf) instead
of hard-coding /etc/ldap.conf.  Bump the PKGREVISION.
2004-11-19 23:18:01 +00:00
cube
72a83b746a Update to version 1.6.8pl2. Fixes a security flaw for the sad people using
bash-as-sh (and people allowing bash scripts to be run through sudo).  The
user could override commands by functions of her own.

ChangeLog:

549) Bash exported functions and the CDPATH variable are now stripped from
     the environment passed to the program to be executed.
2004-11-12 16:47:31 +00:00
tv
c487cb967a Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10
in the process.  (More information on tech-pkg.)

Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and
installing .la files.

Bump PKGREVISION (only) of all packages depending directly on the above
via a buildlink3 include.
2004-10-03 00:12:51 +00:00
agc
7847f8610c Use "pl" as the magic abbreviation for "pathlevel" in the package name. 2004-09-17 09:45:02 +00:00