- Update to 1.6.9p1

* Worked around a bug in some PAM implementations that caused a crash
    when no tty was present.
  * Fixed a crash on some platforms in the error logging function.
- Change default pam session stack to pam_permit like su does [1]
- Grab maintainership

Sugested by:	des [1]
This commit is contained in:
Tom McLaughlin 2007-07-26 15:53:40 +00:00
parent 6c6334da7a
commit 59a1468866
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=196325
4 changed files with 9 additions and 22 deletions

View File

@ -6,8 +6,7 @@
#
PORTNAME= sudo
PORTVERSION= 1.6.9
PORTREVISION= 1
PORTVERSION= 1.6.9.p1
CATEGORIES= security
MASTER_SITES= http://www.sudo.ws/sudo/dist/ \
http://probsd.org/sudoftp/ \
@ -19,8 +18,9 @@ MASTER_SITES= http://www.sudo.ws/sudo/dist/ \
http://pluto.cdpa.nsysu.edu.tw/sudo/ \
ftp://ftp.cs.colorado.edu/pub/sysadmin/sudo/ \
ftp://ftp.stikman.com/pub/sudo/
DISTNAME= ${PORTNAME}-1.6.9p1
MAINTAINER= ports@FreeBSD.org
MAINTAINER= tmclaugh@FreeBSD.org
COMMENT= Allow others to run commands as root
GNU_CONFIGURE= yes

View File

@ -1,3 +1,3 @@
MD5 (sudo-1.6.9.tar.gz) = 7eeb0d89a7c358012377c8d150581cd7
SHA256 (sudo-1.6.9.tar.gz) = 7c657029eaebe5dfa3617e47fcb90c1ed8a5eddebc48b8efeb85c88ee647787f
SIZE (sudo-1.6.9.tar.gz) = 557692
MD5 (sudo-1.6.9p1.tar.gz) = 3bd851451f00001f1f405653f2c1682f
SHA256 (sudo-1.6.9p1.tar.gz) = 1b8bb1f15001844e956a3e72970d78b27ce737dbf4b59c60b6bb729349255757
SIZE (sudo-1.6.9p1.tar.gz) = 557995

View File

@ -11,9 +11,9 @@ auth include system
account include system
# session
# XXX: pam_lastlog causes users to appear as though they are no longer
# logged in in system logs. This is a temporary workaround.
#session include system
# XXX: pam_lastlog (used in system) causes users to appear as though
# they are no longer logged in in system logs.
session include pam_permit.so
# password
password include system

View File

@ -1,13 +0,0 @@
--- auth/pam.c.orig 2007-06-11 21:41:12.000000000 -0400
+++ auth/pam.c 2007-07-22 21:02:46.956010000 -0400
@@ -94,7 +94,9 @@
log_error(USE_ERRNO|NO_EXIT|NO_MAIL, "unable to initialize PAM");
return(AUTH_FATAL);
}
- if (strcmp(user_tty, "unknown"))
+ if (strcmp(user_tty, "unknown") == 0)
+ (void) pam_set_item(pamh, PAM_TTY, "");
+ else
(void) pam_set_item(pamh, PAM_TTY, user_tty);
return(AUTH_SUCCESS);