Hello community, here is the log from the commit of package sudo for openSUSE:Factory checked in at 2013-10-08 20:35:01 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/sudo (Old) and /work/SRC/openSUSE:Factory/.sudo.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "sudo" Changes: -------- --- /work/SRC/openSUSE:Factory/sudo/sudo.changes 2013-07-16 07:39:32.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.sudo.new/sudo.changes 2013-10-08 20:35:02.000000000 +0200 @@ -1,0 +2,43 @@ +Tue Oct 8 09:21:18 UTC 2013 - [email protected] + +- update to 1.8.8 +- drop sudo-plugins-sudoers-sssd.patch (upstream) + * Removed a warning on PAM systems with stacked auth modules + where the first module on the stack does not succeed. + * Sudo, sudoreplay and visudo now support GNU-style long options. + * The -h (--host) option may now be used to specify a host name. + This is currently only used by the sudoers plugin in conjunction + with the -l (--list) option. + * Sudo's LDAP SASL support now works properly with Kerberos. + Previously, the SASL library was unable to locate the user's + credential cache. + * It is now possible to set the nproc resource limit to unlimited + via pam_limits on Linux (bug #565). + * New "pam_service" and "pam_login_service" sudoers options + that can be used to specify the PAM service name to use. + * New "pam_session" and "pam_setcred" sudoers options that + can be used to disable PAM session and credential support. + * The sudoers plugin now properly supports UIDs and GIDs + that are larger than 0x7fffffff on 32-bit platforms. + * Fixed a visudo bug introduced in sudo 1.8.7 where per-group + Defaults entries would cause an internal error. + * If the "tty_tickets" sudoers option is enabled (the default), + but there is no tty present, sudo will now use a ticket file + based on the parent process ID. This makes it possible to support + the normal timeout behavior for the session. + * Fixed a problem running commands that change their process + group and then attempt to change the terminal settings when not + running the command in a pseudo-terminal. Previously, the process + would receive SIGTTOU since it was effectively a background + process. Sudo will now grant the child the controlling tty and + continue it when this happens. + * The "closefrom_override" sudoers option may now be used in + a command-specified Defaults entry (bug #610). + * Fixed visudo's -q (--quiet) flag, broken in sudo 1.8.6. + * Root may no longer change its SELinux role without entering + a password. + * Fixed a bug introduced in Sudo 1.8.7 where the indexes written + to the I/O log timing file are two greater than they should be. + Sudoreplay now contains a work-around to parse those files. + +------------------------------------------------------------------- Old: ---- sudo-1.8.7.tar.gz sudo-plugins-sudoers-sssd.patch New: ---- sudo-1.8.8.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ sudo.spec ++++++ --- /var/tmp/diff_new_pack.8eXgAR/_old 2013-10-08 20:35:11.000000000 +0200 +++ /var/tmp/diff_new_pack.8eXgAR/_new 2013-10-08 20:35:11.000000000 +0200 @@ -17,7 +17,7 @@ Name: sudo -Version: 1.8.7 +Version: 1.8.8 Release: 0 Summary: Execute some commands as root License: ISC @@ -30,7 +30,6 @@ # PATCH-OPENSUSE: the "SUSE" branding of the default sudo config Patch1: sudo-sudoers.patch # PATCH-FIX-UPSTREAM: fixes 64bit-portability-issue ./sssd.c:829; sent upstream -Patch2: sudo-plugins-sudoers-sssd.patch BuildRequires: audit-devel BuildRequires: groff BuildRequires: libselinux-devel @@ -61,7 +60,6 @@ %setup -q %patch0 -p1 %patch1 -p1 -%patch2 -p1 %build %ifarch s390 s390x %sparc ++++++ sudo-1.8.7.tar.gz -> sudo-1.8.8.tar.gz ++++++ ++++ 42744 lines of diff (skipped) -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
