sudo 1.8.3p1-1ubuntu1 source package in Ubuntu

Changelog

sudo (1.8.3p1-1ubuntu1) precise; urgency=low

  * Merge from debian/testing, remaining changes:
    - debian/patches/keep_home_by_default.patch:
      + Set HOME in initial_keepenv_table. (rebased for 1.8.3p1)
    - debian/patches/enable_badpass.patch: turn on "mail_badpass" by default:
      + attempting sudo without knowing a login password is as bad as not
        being listed in the sudoers file, especially if getting the password
        wrong means doing the access-check-email-notification never happens
        (rebased for 1.8.3p1)
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets (Ubuntu specific)
      + install man/man8/sudo_root.8 (Ubuntu specific)
      + install apport hooks
      + The ubuntu-sudo-as-admin-successful.patch was taken upstream by
        Debian however it requires a --enable-admin-flag configure flag to
        actually enable it.
    - debian/sudoers:
      + grant admin group sudo access
    - debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
    - debian/sudo.preinst:
      + avoid conffile prompt by checking for known default /etc/sudoers
        and if found installing the correct default /etc/sudoers file

sudo (1.8.3p1-1) unstable; urgency=low

  * new upstream version, closes: #646478

sudo (1.8.3-1) unstable; urgency=low

  * new upstream version, closes: #639391, #639568

sudo (1.8.2-2) unstable; urgency=low

  [ Luca Capello ]
  * debian/rules improvements, closes: #642535
    + mv upstream sample.* files to the examples folder.
    - do not call dh_installexamples.

  [ Bdale Garbee ]
  * patch from upstream for SIGBUS on sparc64, closes: #640304
  * use common-session-noninteractive in the pam config to reduce log noise
    when sudo is used in cron, etc, closes: #519700
  * patch from Steven McDonald to fix segfault on startup under certain
    conditions, closes: #639568
  * add a NEWS entry regarding the secure_path change made in 1.8.2-1,
    closes: #639336

sudo (1.8.2-1) unstable; urgency=low

  * new upstream version, closes: #637449, #621830
  * include common-session in pam config, closes: #519700, #607199
  * move secure_path from configure to default sudoers, closes: #85123, 85917
  * improve sudoers self-documentation, closes: #613639
  * drop --disable-setresuid since modern systems should not run 2.2 kernels
  * lose the --with-devel configure option since it's breaking builds in
    subdirectories for some reason
 -- Marc Deslauriers <email address hidden>   Sun, 20 Nov 2011 12:07:45 -0500

Upload details

Uploaded by:
Marc Deslauriers
Uploaded to:
Precise
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
admin
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
sudo_1.8.3p1.orig.tar.gz 1.5 MiB 1a22635bc5a0a84df273a893c624d45f628c78668317c5bc442dac11db55bb82
sudo_1.8.3p1-1ubuntu1.debian.tar.gz 28.0 KiB 98f989f2bf0f87f6c7593d58c37c2e949971da8c7110d52ff23f3aa99a0257c0
sudo_1.8.3p1-1ubuntu1.dsc 1.9 KiB dd029ee5158b7ff11d56fbf44dd1f72a3f59e93a4b27186aa7d76c6e9436be12

View changes file

Binary packages built by this source

sudo: Provide limited super user privileges to specific users

 Sudo is a program designed to allow a sysadmin to give limited root
 privileges to users and log root activity. The basic philosophy is to give
 as few privileges as possible but still allow people to get their work done.
 .
 This version is built with minimal shared library dependencies, use the
 sudo-ldap package instead if you need LDAP support for sudoers.

sudo-ldap: Provide limited super user privileges to specific users

 Sudo is a program designed to allow a sysadmin to give limited root
 privileges to users and log root activity. The basic philosophy is to give
 as few privileges as possible but still allow people to get their work done.
 .
 This version is built with LDAP support, which allows an equivalent of the
 sudoers database to be distributed via LDAP. Authentication is still
 performed via pam.