64 Commits

Author SHA1 Message Date
naddy
8c0294c2fa drop RCS Ids 2022-03-11 19:53:16 +00:00
millert
18407824d0 Update to sudo 1.9.10 2022-03-04 17:54:43 +00:00
sthen
29389da44c bump REVISION for switch from Python 3.8 -> 3.9 2021-11-02 00:02:15 +00:00
millert
4ef54729ab Update to sudo 1.9.7p2 2021-07-28 18:46:51 +00:00
millert
e59c3ee517 Update to sudo 1.9.7p1 2021-06-11 21:49:41 +00:00
millert
443a01a3dc Update to sudo 1.9.7 2021-05-12 13:02:09 +00:00
millert
06641650cf Update to sudo 1.9.6p1 2021-03-15 18:49:47 +00:00
sthen
745105c362 automatically handle ports which use the python module and have flavours
other than the usual "python3/<blank>" python version selection and
remove setting MODPY_VERSION=${MODPY_DEFAULT_VERSION_3} again from the
affected ports.
2021-02-23 22:04:35 +00:00
sthen
761c9f34ff ports which use the python module and have flavours other than the
usual "python3/<blank>" python version selection still require setting
MODPY_VERSION for now.
2021-02-23 21:45:49 +00:00
sthen
3cbe1c2f30 Reverse the polarity of MODPY_VERSION; default is now 3.x,
if a port needs 2.x then set MODPY_VERSION=${MODPY_DEFAULT_VERSION_2}.

This commit doesn't change any versions currently used; it may be that
some ports have MODPY_DEFAULT_VERSION_2 but don't require it, those
should be cleaned up in the course of updating ports where possible.

Python module ports providing py3-* packages should still use
FLAVOR=python3 so that we don't have a mixture of dependencies some
using ${MODPY_FLAVOR} and others not.
2021-02-23 19:39:08 +00:00
sthen
053c6189b6 add FLAVOR_STRING to SUBST_VARS, fixing an issue with updates from pre-
multipackage versions reported by danj@ and reproduced by tb@
2021-01-26 21:18:35 +00:00
millert
d69645e849 Update to sudo 1.9.5p2; fixes CVE-2021-3156 2021-01-26 18:19:19 +00:00
millert
e33586a494 Update to sudo 1.9.5p1 2021-01-12 02:19:47 +00:00
millert
1743229737 Update to sudo 1.9.5 2021-01-11 14:55:29 +00:00
millert
2a4d24eafd Update to sudo 1.9.4p2 2020-12-20 17:37:48 +00:00
millert
fb7d438e34 Update to sudo 1.9.4p1 2020-12-18 17:31:32 +00:00
millert
b684478c92 Update to sudo 1.9.4 2020-11-30 17:04:34 +00:00
danj
0529b6ba4e Improve PKGNAME handling
ok millert@ (maintainer)
2020-09-24 02:44:14 +00:00
millert
0993824974 Update to sudo 1.9.3p1. 2020-09-24 02:16:12 +00:00
millert
50865a7200 Update to sudo 1.9.3p1. 2020-09-24 01:38:42 +00:00
sthen
d9cfe4113e bump REVISION; python 3 default changed to 3.8 2020-07-03 21:12:24 +00:00
sthen
932c9dac61 append the flavour to the @pkgpath marker, otherwise all flavoured packages
have @pkgpath security/sudo and act as candidates for each other, i.e. to
stop all pkg_add -u runs from asking which flavour to use.  ok millert@
2020-06-26 20:23:54 +00:00
millert
25560ca07a @sample lines need to come immediately after the file they are sampling.
From deserter666 AT danwin1210
2020-06-24 15:58:21 +00:00
sthen
e4b68d0789 sudo needs @pkgpath so that updates work (package path for the main
package changed security/sudo -> security/sudo,-main so without this
it's not considered a valid update candidate)
2020-06-21 12:38:52 +00:00
millert
3052f16def Update to sudo 1.9.1.
This adds a new sub-package for the optional Python plugin support,
which can be disabled via the no_python pseudo-flavor.
Thanks to sthen@ and ajacoutot@ for their help.
2020-06-21 12:03:33 +00:00
millert
8fec1b1efc Update sudo to 1.8.31:
* Fixed CVE-2019-18634, a buffer overflow when the "pwfeedback"
   sudoers option is enabled on systems with uni-directional pipes.

 * The "sudoedit_checkdir" option now treats a user-owned directory
   as writable, even if it does not have the write bit set at the
   time of check.  Symbolic links will no longer be followed by
   sudoedit in any user-owned directory.  Bug #912

 * Fixed sudoedit on macOS 10.15 and above where the root file system
   is mounted read-only.  Bug #913.

 * Fixed a crash introduced in sudo 1.8.30 when suspending sudo
   at the password prompt.  Bug #914.

 * Fixed compilation on systems where the mmap MAP_ANON flag
   is not available.  Bug #915.
2020-01-30 18:47:11 +00:00
millert
324a4383d7 Update sudo to 1.8.30:
* Fixed a warning on macOS introduced in sudo 1.8.29 when sudo
   attempts to set the open file limit to unlimited.  Bug #904.

 * Sudo now closes file descriptors before changing uids.  This
   prevents a non-root process from interfering with sudo's ability
   to close file descriptors on systems that support the prlimit(2)
   system call.

 * Sudo now treats an attempt to run "sudo sudoedit" as simply
   "sudoedit".  If the sudoers file contains a fully-qualified path
   to sudoedit, sudo will now treat it simply as "sudoedit" (with
   no path).  Visudo will will now treat a fully-qualified path
   to sudoedit as an error.  Bug #871.

 * Fixed a bug introduced in sudo 1.8.28 where sudo would warn about
   a missing /etc/environment file on AIX and Linux when PAM is not
   enabled.  Bug #907

 * Fixed a bug on Linux introduced in sudo 1.8.29 that prevented
   the askpass program from running due to an unlimited stack size
   resource limit.  Bug #908.

 * If a group provider plugin has optional arguments, the argument list
   passed to the plugin is now NULL terminated as per the documentation.

 * The user's time stamp file is now only updated if both authentication
   and approval phases succeed.  This is consistent with the behavior
   of sudo prior to version 1.8.23.  Bug #910

 * The new allow_unknown_runas_id sudoers setting can be used to
   enable or disable the use of unknown user or group IDs.  Previously,
   sudo would always allow unknown user or group IDs if the sudoers
   entry permitted it, including via the "ALL" alias.  As of sudo
   1.8.30, the admin must explicitly enable support for unknown IDs.

 * The new runas_check_shell sudoers setting can be used to require
   that the runas user have a shell listed in the /etc/shells file.
   On many systems, users such as "bin", do not have a valid shell
   and this flag can be used to prevent commands from being run as
   those users.

 * Fixed a problem restoring the SELinux tty context during reboot
   if mctransd is killed before sudo finishes.  GitHub Issue #17.

 * Fixed an intermittent warning on NetBSD when sudo restores the
   initial stack size limit.
2019-12-31 21:54:25 +00:00
millert
f9dd2cf493 Update sudo to 1.8.29:
* The cvtsudoers command will now reject non-LDIF input when converting
   from LDIF format to sudoers or JSON formats.

 * The new log_allowed and log_denied sudoers settings make it possible
   to disable logging and auditing of allowed and/or denied commands.

 * The umask is now handled differently on systems with PAM or login.conf.
   If the umask is explicitly set in sudoers, that value is used regardless
   of what PAM or login.conf may specify.  However, if the umask is not
   explicitly set in sudoers, PAM or login.conf may now override the default
   sudoers umask.  Bug #900.

 * For "make install", the sudoers file is no longer checked for syntax
   errors when DESTDIR is set.  The default sudoers file includes the
   contents of /etc/sudoers.d which may not be readable as non-root.
   Bug #902.

 * Sudo now sets most resource limits to their maximum value to avoid
   problems caused by insufficient resources, such as an inability to
   allocate memory or open files and pipes.

 * Fixed a regression introduced in sudo 1.8.28 where sudo would refuse
   to run if the parent process was not associated with a session.
   This was due to sudo passing a session ID of -1 to the plugin.
2019-10-28 15:02:49 +00:00
sthen
9fe02b340e bump REVISION for -current sudo to take it to the same version as 6.6-stable 2019-10-22 09:36:21 +00:00
millert
61c6e8bd31 Sudo 1.8.28p1 fixes a minor regression introduced in 1.8.28. 2019-10-16 15:09:25 +00:00
millert
82340fd5dc Update sudo to 1.8.28, fixes CVE-2019-14287
See https://www.sudo.ws/alerts/minus_1_uid.html for details
2019-10-14 15:17:27 +00:00
sthen
77f7cc9c61 replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:49:33 +00:00
sthen
6ff3e55398 bump REVISION in a bunch of ports known or likely to use struct kinfo_proc,
there may be some missing as my unpacked ports source is a little out of date
but this should catch the main things people might run into

the struct was reordered a second time in sysctl.h r1.192 to improve
compatibility but amd64 snapshot packages made it out before that happened
so the bumps are still needed
2019-06-25 20:25:20 +00:00
naddy
ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
millert
5e7af8f603 Update to sudo 1.8.27 2019-01-13 02:58:15 +00:00
millert
5d08bf42fb Update to sudo 1.8.26
The PLIST file was missing cvtsudoers(1) which was added in 1.8.23
2018-11-16 13:19:23 +00:00
millert
6a3e6406e5 Update to sudo 1.8.25 2018-09-04 03:01:00 +00:00
millert
88d91ac293 Update to sudo 1.8.24 2018-08-18 21:40:09 +00:00
espie
f36eb7eff8 use PREFIX, TRUEPREFIX is the same 2018-05-26 09:54:51 +00:00
millert
a2ffd7ed31 Update to sudo 1.8.23 2018-04-30 20:55:38 +00:00
millert
d2d2e03d48 Update to sudo 1.8.22 2018-01-16 13:24:06 +00:00
naddy
03558d5206 replace gettext module; ok millert@ 2017-11-15 16:24:13 +00:00
millert
c2345cc4f8 Update to sudo 1.8.21p2 2017-09-07 12:03:07 +00:00
millert
59f5cd1cc5 Update to sudo 1.8.21p1 2017-09-01 21:36:55 +00:00
millert
341ef7e3eb Update to sudo 1.8.21 2017-08-24 11:48:41 +00:00
millert
d66cbc7cb9 update to sudo 1.8.20p2; no real change on OpenBSD 2017-05-31 20:33:44 +00:00
millert
218a84ca74 update to sudo 1.8.20p1 2017-05-30 19:55:15 +00:00
millert
7edc618bfd update to sudo 1.8.20 2017-05-10 16:07:54 +00:00
millert
98694c5a03 update to sudo 1.8.19p2 2017-01-14 16:39:24 +00:00
millert
9e6f7dfafe Update to sudo 1.8.19p1 2016-12-20 17:35:18 +00:00