Change logs for sudo source package in Focal

  • sudo (1.8.31-1ubuntu1.5) focal-security; urgency=medium
    
      * SECURITY UPDATE: does not escape control characters
        - debian/patches/CVE-2023-2848x-1.patch: escape control characters in
          log messages and sudoreplay output in docs/sudoers.man.in,
          docs/sudoers.mdoc.in, docs/sudoreplay.man.in,
          docs/sudoreplay.mdoc.in, include/sudo_compat.h, include/sudo_lbuf.h,
          lib/util/lbuf.c, lib/util/util.exp.in, plugins/sudoers/logging.c,
          plugins/sudoers/sudoreplay.c.
        - debian/patches/CVE-2023-2848x-2.patch: fix regression in
          plugins/sudoers/logging.c.
        - CVE-2023-28486
        - CVE-2023-28487
    
     -- Marc Deslauriers <email address hidden>  Tue, 04 Apr 2023 07:56:28 -0400
  • sudo (1.8.31-1ubuntu1.4) focal-security; urgency=medium
    
      * SECURITY UPDATE: arbitrary file overwrite via sudoedit
        - debian/patches/CVE-2023-22809.patch: do not permit editor arguments
          to include -- in plugins/sudoers/editor.c, plugins/sudoers/sudoers.c,
          plugins/sudoers/visudo.c.
        - CVE-2023-22809
    
     -- Marc Deslauriers <email address hidden>  Mon, 16 Jan 2023 08:06:24 -0500
  • sudo (1.8.31-1ubuntu1.2) focal-security; urgency=medium
    
      * SECURITY UPDATE: dir existence issue via sudoedit race
        - debian/patches/CVE-2021-23239.patch: fix potential directory existing
          info leak in sudoedit in src/sudo_edit.c.
        - CVE-2021-23239
      * SECURITY UPDATE: heap-based buffer overflow
        - debian/patches/CVE-2021-3156-pre1.patch: sanity check size when
          converting the first record to TS_LOCKEXCL in
          plugins/sudoers/timestamp.c.
        - debian/patches/CVE-2021-3156-1.patch: reset valid_flags to
          MODE_NONINTERACTIVE for sudoedit in src/parse_args.c.
        - debian/patches/CVE-2021-3156-2.patch: add sudoedit flag checks in
          plugin in plugins/sudoers/policy.c.
        - debian/patches/CVE-2021-3156-3.patch: fix potential buffer overflow
          when unescaping backslashes in plugins/sudoers/sudoers.c.
        - debian/patches/CVE-2021-3156-4.patch: fix the memset offset when
          converting a v1 timestamp to TS_LOCKEXCL in
          plugins/sudoers/timestamp.c.
        - debian/patches/CVE-2021-3156-5.patch: don't assume that argv is
          allocated as a single flat buffer in src/parse_args.c.
        - CVE-2021-3156
    
     -- Marc Deslauriers <email address hidden>  Tue, 19 Jan 2021 09:21:02 -0500
  • sudo (1.8.31-1ubuntu1.1) focal; urgency=medium
    
      * d/p/ignore-rlimit-core-failure.patch: Ignore a failure to restore the
        RLIMIT_CORE resource limit.  Linux containers don't allow RLIMIT_CORE
        to be set back to RLIM_INFINITY if we set the limit to zero, even for
        root.  RLIMIT_NPROC is also not allowed to be set back.  This is not a
        problem outside the container.
        (LP: #1857036)
    
     -- Bryce Harrington <email address hidden>  Wed, 15 Jul 2020 00:17:58 +0000
  • sudo (1.8.31-1ubuntu1) focal; urgency=medium
    
      * Merge from Debian unstable. Remaining changes:
        - debian/rules, debian/sudo.service, debian/sudo.sudo.init: stop
          shipping init script and service file, as they are no longer
          necessary.
        - debian/rules:
          + compile with --without-lecture --with-tty-tickets --enable-admin-flag
          + install man/man8/sudo_root.8 in both flavours
          + install apport hooks
        - debian/source_sudo.py, debian/sudo-ldap.dirs, debian/sudo.dirs:
          + add usr/share/apport/package-hooks
        - debian/sudo.pam:
          + Use pam_env to read /etc/environment and /etc/default/locale
            environment files. Reading ~/.pam_environment is not permitted due to
            security reasons.
        - debian/sudoers:
          + also grant admin group sudo access
          + include /snap/bin in the secure_path
        - debian/control, debian/rules:
          + use dh-autoreconf
    
    sudo (1.8.31-1) unstable; urgency=medium
    
      * new upstream version
    
     -- Marc Deslauriers <email address hidden>  Mon, 03 Feb 2020 09:32:18 -0500
  • sudo (1.8.29-1ubuntu1) focal; urgency=medium
    
      * Merge from Debian unstable.
        Remaining changes:
        - debian/rules, debian/sudo.service, debian/sudo.sudo.init: stop
          shipping init script and service file, as they are no longer
          necessary.
        - debian/rules:
          + compile with --without-lecture --with-tty-tickets --enable-admin-flag
          + install man/man8/sudo_root.8 in both flavours
          + install apport hooks
        - debian/source_sudo.py, debian/sudo-ldap.dirs, debian/sudo.dirs:
          + add usr/share/apport/package-hooks
        - debian/sudo.pam:
          + Use pam_env to read /etc/environment and /etc/default/locale
            environment files. Reading ~/.pam_environment is not permitted due to
            security reasons.
        - debian/sudoers:
          + also grant admin group sudo access
          + include /snap/bin in the secure_path
        - debian/control, debian/rules:
          + use dh-autoreconf
      * Removed patches included in new version:
        - debian/patches/CVE-2019-14287.patch
        - debian/patches/CVE-2019-14287-2.patch
    
    sudo (1.8.29-1) unstable; urgency=medium
    
      * new upstream version
      * make --libexecdir use /usr/lib instead of /usr/lib/sudo, closes: #943313
    
    sudo (1.8.28p1-1) unstable; urgency=medium
    
      * new upstream version
    
    sudo (1.8.27-1.1) unstable; urgency=high
    
      * Non-maintainer upload.
      * Treat an ID of -1 as invalid since that means "no change" (CVE-2019-14287)
        (Closes: #942322)
      * Fix test failure in plugins/sudoers/regress/testsudoers/test5.sh
    
     -- Marc Deslauriers <email address hidden>  Tue, 26 Nov 2019 13:13:21 -0500
  • sudo (1.8.27-1ubuntu4) eoan; urgency=medium
    
      * SECURITY UPDATE: privilege escalation via UID -1
        - debian/patches/CVE-2019-14287.patch: treat an ID of -1 as invalid
          in lib/util/strtoid.c.
        - debian/patches/CVE-2019-14287-2.patch: fix and add to tests in
          lib/util/regress/atofoo/atofoo_test.c,
          plugins/sudoers/regress/testsudoers/test5.out.ok,
          plugins/sudoers/regress/testsudoers/test5.sh.
        - CVE-2019-14287
    
     -- Marc Deslauriers <email address hidden>  Tue, 15 Oct 2019 07:09:02 -0400