Change logs for sudo source package in Lucid

  • sudo (1.7.2p1-1ubuntu5.8) lucid-security; urgency=medium
    
      * SECURITY UPDATE: arbitrary file access via TZ
        - configure, configure.in, doc/sudoers.cat, doc/sudoers.man.in,
          pathnames.h.in, plugins/sudoers/env.c: sanity check TZ env variable.
        - http://www.sudo.ws/repos/sudo/rev/650ac6938b59
        - http://www.sudo.ws/repos/sudo/rev/ac1467f71ac0
        - http://www.sudo.ws/repos/sudo/rev/91859f613b88
        - http://www.sudo.ws/repos/sudo/rev/579b02f0dbe0
        - CVE-2014-9680
     -- Marc Deslauriers <email address hidden>   Thu, 12 Mar 2015 12:21:20 -0400
  • sudo (1.7.2p1-1ubuntu5.7) lucid-security; urgency=medium
    
      * SECURITY UPDATE: security policy bypass when env_reset is disabled
        - env.c: fix logic inversion
        - http://www.sudo.ws/repos/sudo/rev/748cefb49422
        - CVE-2014-0106
     -- Marc Deslauriers <email address hidden>   Mon, 10 Mar 2014 13:43:32 -0400
  • sudo (1.7.2p1-1ubuntu5.6) lucid-security; urgency=low
    
      * SECURITY UPDATE: authentication bypass via clock set to epoch
        - debian/patches/CVE-2013-1775.patch: ignore time stamp file if it is
          set to epoch in check.c.
        - backported from ddf399e3e306ca238f6f1cda8153889b15bba12e
        - CVE-2013-1775
     -- Marc Deslauriers <email address hidden>   Wed, 27 Feb 2013 13:45:39 -0500
  • sudo (1.7.2p1-1ubuntu5.5) lucid-proposed; urgency=low
    
      * toke.{cl}: avoid duplicate fclose() of the sudoers file (LP: #553786)
        - http://www.sudo.ws/repos/sudo/rev/164d39108dde
     -- Marc Deslauriers <email address hidden>   Thu, 22 Nov 2012 16:08:01 -0500
  • sudo (1.7.2p1-1ubuntu5.4) lucid-security; urgency=low
    
      * SECURITY UPDATE: Properly handle multiple netmasks in sudoers Host and
        Host_List values
        - match.c: Prevent IPv6 netmask-based address matching logic from
          incorrectly being applied to IPv4 addresses. Based on upstream patch
          written by Todd C. Miller.
        - CVE-2012-2337
     -- Tyler Hicks <email address hidden>   Tue, 15 May 2012 23:28:04 -0500
  • sudo (1.7.2p1-1ubuntu5.3) lucid-security; urgency=low
    
      * SECURITY UPDATE: privilege escalation via -g when using group Runas_List
        - pwutil.c, sudo.h: add user_in_group(), backported from upstream commits
          48ca8c2eddf8, 72df368a8a0e and 6ebc55d4716b. This is intended to be used
          only with check.c to fix CVE-2011-0010 instead of doing the refactoring.
          Going forward, will need to look at this code also if a flaw is found in
          this refactored code. If needed, the refactoring work is in 48ca8c2eddf8
          and 6ebc55d4716b.
        - check.c: prompt for password when the user is running sudo as himself
          but as a different group. Backported from fe8a94f96542.
        - CVE-2011-0010
     -- Jamie Strandboge <email address hidden>   Wed, 19 Jan 2011 10:39:09 -0600
  • sudo (1.7.2p1-1ubuntu5.2) lucid-security; urgency=low
    
      * SECURITY UPDATE: privilege escalation via '-g' option when using
        'user:group' in Runas_Spec
        - update match.c to verify both user and group match sudoers when using
          '-g'. Patch thanks to upstream.
        - CVE-2010-2956
     -- Jamie Strandboge <email address hidden>   Tue, 31 Aug 2010 15:16:00 -0500
  • sudo (1.7.2p1-1ubuntu5.1) lucid-security; urgency=low
    
      * SECURITY UPDATE: properly handle multiple PATH variables when using
        secure_path in env.c
        - http://www.sudo.ws/repos/sudo/raw-rev/a09c6812eaec
        - CVE-2010-1646
     -- Jamie Strandboge <email address hidden>   Fri, 18 Jun 2010 14:00:54 -0500
  • sudo (1.7.2p1-1ubuntu5) lucid; urgency=low
    
      * SECURITY UPDATE: properly verify path in find_path.c for the 'sudoedit'
        pseudo-command when running from the current working directory and
        secure_path is disabled
        - CVE-2010-XXXX
     -- Jamie Strandboge <email address hidden>   Wed, 07 Apr 2010 15:35:36 -0500
  • sudo (1.7.2p1-1ubuntu4) lucid; urgency=low
    
      * env.c: Revert addition of "http_proxy" again. This was an Ubuntu specific
        EBW hack, caused inconsistencies with other proxy variables (such as
        https_proxy and ftp_proxy), made sudo incompatible to upstream
        behaviour/documentation. This is solved in a much better way in apt itself
        and gnome-network-properties now. (LP: #432631)
     -- Martin Pitt <email address hidden>   Fri, 26 Mar 2010 18:48:18 +0100
  • sudo (1.7.2p1-1ubuntu3) lucid; urgency=low
    
      * debian/sudo.postinst, debian/sudo-ldap.postinst: update description to
        match behaviour in sudoers file. (LP: #534090)
     -- Marc Deslauriers <email address hidden>   Sun, 07 Mar 2010 19:49:39 -0500
  • sudo (1.7.2p1-1ubuntu2) lucid; urgency=low
    
      * SECURITY UPDATE: properly verify path for the 'sudoedit' pseudo-command
        in match.c
        - http://sudo.ws/repos/sudo/rev/88f3181692fe
        - CVE-2010-0426
     -- Jamie Strandboge <email address hidden>   Wed, 24 Feb 2010 16:50:11 -0600
  • sudo (1.7.2p1-1ubuntu1) lucid; urgency=low
    
      * Merge from debian testing.  Remaining changes:
       - debian/rules: Disable lecture, enable tty_tickets by default. (Ubuntu
         specific)
       - Add debian/sudo_root.8: Explanation of root handling through sudo.
         Install it in debian/rules. (Ubuntu specific)
       - sudo.c: If the user successfully authenticated and he is in the 'admin'
         group, then create a stamp ~/.sudo_as_admin_successful. Our default bash
         profile checks for this and displays a short intro about sudo if the
         flag is not present. (Ubuntu specific)
       - env.c: Add "http_proxy" to initial_keepenv_table, so that it is kept
         for "sudo apt-get ...". (Ubuntu specific EBW hack, should disappear at
         some point)
       - debian/{rules,postinst,sudo-ldap.postinst}: Disable init script
         installation. Debian reintroduced it because /var/run tmpfs is not the
         default there, but has been on Ubuntu for ages.
       - debian/{source_sudo.py,rules,sudo-ldap.dirs,sudo.dirs}: Add apport hook
    
    sudo (1.7.2p1-1) unstable; urgency=low
    
      * new upstream version
      * add support for /etc/sudoers.d using #includedir in default sudoers,
        which I think is also a good solution to the request for a crontab-like
        API requested in March of 2001, closes: #539994, #271813, #89743
      * move init.d script from using rcS.d to rc[0-6].d, closes: #542924
    
    sudo (1.7.2-2) unstable; urgency=low
    
      * further improve initial sudoers to not include the NOPASSWD option on
        the group sudo exception, closes: #539136, #198991
    
    sudo (1.7.2-1) unstable; urgency=low
    
      * new upstream version, closes: #537103
      * improve initial sudoers by having the exemption for users in group
        sudo on by default, and including the ability to run any command as
        any user.  This makes the default install roughly equivalent to our
        old use of the --with-exempt=sudo build option, closes: #536220, #536222
     -- Marc Deslauriers <email address hidden>   Mon, 08 Feb 2010 18:47:06 -0500
  • sudo (1.7.0-1ubuntu3) lucid; urgency=low
    
      * debian/{source_sudo.py,rules}: Add apport hook
     -- Marc Deslauriers <email address hidden>   Fri, 29 Jan 2010 09:31:00 -0500
  • sudo (1.7.0-1ubuntu2) karmic; urgency=low
    
      * env.c: add logic similar to pam_env's stripping of single and double
        quotes around /etc/environment env vars; fixes literal quotes in LANG when
        using sudo -i; LP: #387262.
    
     -- Loic Minier <email address hidden>   Mon, 22 Jun 2009 18:03:45 +0200