Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package sudo for openSUSE:Factory checked in 
at 2021-01-18 11:27:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sudo (Old)
 and      /work/SRC/openSUSE:Factory/.sudo.new.28504 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sudo"

Mon Jan 18 11:27:27 2021 rev:120 rq:863081 version:1.9.5p1

Changes:
--------
--- /work/SRC/openSUSE:Factory/sudo/sudo.changes        2020-12-24 
19:37:36.210962618 +0100
+++ /work/SRC/openSUSE:Factory/.sudo.new.28504/sudo.changes     2021-01-18 
11:30:43.628475960 +0100
@@ -1,0 +2,60 @@
+Thu Jan 14 08:54:04 UTC 2021 - Kristyna Streitova <kstreit...@suse.com>
+
+- Update to 1.9.5.p1
+  * Fixed a regression introduced in sudo 1.9.5 where the editor run
+    by sudoedit was set-user-ID root unless SELinux RBAC was in use.
+    The editor is now run with the user's real and effective user-IDs.
+
+- News in 1.9.5
+  * Fixed a crash introduced in 1.9.4 when running "sudo -i" as an
+    unknown user.  This is related to but distinct from Bug #948.
+  * If the "lecture_file" setting is enabled in sudoers, it must now
+    refer to a regular file or a symbolic link to a regular file.
+  * Fixed a potential use-after-free bug in sudo_logsrvd when the
+    server shuts down if there are existing connections from clients
+    that are only logging events and not session I/O data.
+  * Fixed a buffer size mismatch when serializing the list of IP
+    addresses for configured network interfaces.  This bug is not
+    actually exploitable since the allocated buffer is large enough
+    to hold the list of addresses.
+  * If sudo is executed with a name other than "sudo" or "sudoedit",
+    it will now fall back to "sudo" as the program name.  This affects
+    warning, help and usage messages as well as the matching of Debug
+    lines in the /etc/sudo.conf file.  Previously, it was possible
+    for the invoking user to manipulate the program name by setting
+    argv[0] to an arbitrary value when executing sudo.
+  * Sudo now checks for failure when setting the close-on-exec flag
+    on open file descriptors.  This should never fail but, if it
+    were to, there is the possibility of a file descriptor leak to
+    a child process (such as the command sudo runs).
+  * Fixed CVE-2021-23239, a potential information leak in sudoedit
+    that could be used to test for the existence of directories not
+    normally accessible to the user in certain circumstances.  When
+    creating a new file, sudoedit checks to make sure the parent
+    directory of the new file exists before running the editor.
+    However, a race condition exists if the invoking user can replace
+    (or create) the parent directory.  If a symbolic link is created
+    in place of the parent directory, sudoedit will run the editor
+    as long as the target of the link exists.  If the target of the
+    link does not exist, an error message will be displayed.  The
+    race condition can be used to test for the existence of an
+    arbitrary directory.  However, it _cannot_ be used to write to
+    an arbitrary location.
+  * Fixed CVE-2021-23240, a flaw in the temporary file handling of
+    sudoedit's SELinux RBAC support.  On systems where SELinux is
+    enabled, a user with sudoedit permissions may be able to set the
+    owner of an arbitrary file to the user-ID of the target user.
+    On Linux kernels that support "protected symlinks", setting
+    /proc/sys/fs/protected_symlinks to 1 will prevent the bug from
+    being exploited.  For more information see
+    https://www.sudo.ws/alerts/sudoedit_selinux.html.
+  * Added writability checks for sudoedit when SELinux RBAC is in use.
+    This makes sudoedit behavior consistent regardless of whether
+    or not SELinux RBAC is in use.  Previously, the "sudoedit_checkdir"
+    setting had no effect for RBAC entries.
+  * A new sudoers option "selinux" can be used to disable sudo's
+    SELinux RBAC support.
+  * Quieted warnings from PVS Studio, clang analyzer, and cppcheck.
+    Added suppression annotations for PVS Studio false positives.
+
+-------------------------------------------------------------------

Old:
----
  sudo-1.9.4p2.tar.gz
  sudo-1.9.4p2.tar.gz.sig

New:
----
  sudo-1.9.5p1.tar.gz
  sudo-1.9.5p1.tar.gz.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sudo.spec ++++++
--- /var/tmp/diff_new_pack.fH99Du/_old  2021-01-18 11:30:44.492486789 +0100
+++ /var/tmp/diff_new_pack.fH99Du/_new  2021-01-18 11:30:44.496486839 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package sudo
 #
-# Copyright (c) 2020 SUSE LLC
+# Copyright (c) 2021 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -22,7 +22,7 @@
 %define use_usretc 1
 %endif
 Name:           sudo
-Version:        1.9.4p2
+Version:        1.9.5p1
 Release:        0
 Summary:        Execute some commands as root
 License:        ISC

++++++ sudo-1.9.4p2.tar.gz -> sudo-1.9.5p1.tar.gz ++++++
++++ 24965 lines of diff (skipped)

Reply via email to