Page MenuHomeSolus

Update sudo to 1.8.30
ClosedPublic

Authored by kyrios123 on Jan 1 2020, 12:14 PM.
Tags
None
Referenced Files
F10958736: D7942.diff
Tue, Jul 18, 2:36 AM
F10896655: D7942.diff
Jul 2 2023, 1:48 AM
F10896621: D7942.diff
Jul 2 2023, 1:34 AM
F10875953: D7942.id19097.diff
Jun 20 2023, 8:21 AM
F10875108: D7942.id19020.diff
Jun 20 2023, 4:03 AM
F10870183: D7942.diff
Jun 18 2023, 8:39 AM
F10766220: D7942.id19020.diff
May 19 2023, 5:17 PM
F10755362: D7942.diff
May 16 2023, 11:41 PM
Subscribers

Details

Summary
  • Sudo now closes file descriptors before changing uids. This prevents a non-root process from interfering with sudo's ability to close file descriptors on systems that support the prlimit(2) system call.
  • Sudo now treats an attempt to run sudo sudoedit as simply sudoedit If the sudoers file contains a fully-qualified path to sudoedit, sudo will now treat it simply as sudoedit (with no path). Visudo will will now treat a fully-qualified path to sudoedit as an error.
  • Fixed a bug introduced in sudo 1.8.28 where sudo would warn about a missing /etc/environment file on AIX and Linux when PAM is not enabled.
  • Fixed a bug on Linux introduced in sudo 1.8.29 that prevented the askpass program from running due to an unlimited stack size resource limit.
  • If a group provider plugin has optional arguments, the argument list passed to the plugin is now NULL terminated as per the documentation.
  • The user's time stamp file is now only updated if both authentication and approval phases succeed. This is consistent with the behavior of sudo prior to version 1.8.23.
  • The new allow_unknown_runas_id sudoers setting can be used to enable or disable the use of unknown user or group IDs. Previously, sudo would always allow unknown user or group IDs if the sudoers entry permitted it, including via the ALL alias. As of sudo 1.8.30, the admin must explicitly enable support for unknown IDs.
  • The new runas_check_shell sudoers setting can be used to require that the runas user have a shell listed in the /etc/shells file. On many systems, users such as bin, do not have a valid shell and this flag can be used to prevent commands from being run as those us

Signed-off-by: Pierre-Yves <pyu@riseup.net>

Test Plan

sudo su

Diff Detail

Repository
R2974 sudo
Branch
master
Lint
No Lint Coverage
Unit
No Test Coverage

Event Timeline

This revision is now accepted and ready to land.Jan 2 2020, 11:46 PM
This revision was automatically updated to reflect the committed changes.