notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Ukraine
Port details
sudo Allow others to run commands as root
1.9.10 security on this many watch lists=497 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 1.9.10Version of this port present on the latest quarterly branch.
Maintainer: garga@FreeBSD.org search for ports maintained by this maintainer
Port Added: unknown
Last Update: 2022-03-04 15:04:25
Commit Hash: c003f33
People watching this port, also watch:: libiconv, gmake, expat, gettext, png
License: sudo
Description:
SVNWeb : git : Homepage
pkg-plist: as obtained via: make generate-plist
Expand this list (146 items)
Collapse this list.
  1. @ldconfig
  2. /usr/local/share/licenses/sudo-1.9.10/catalog.mk
  3. /usr/local/share/licenses/sudo-1.9.10/LICENSE
  4. /usr/local/share/licenses/sudo-1.9.10/sudo
  5. bin/cvtsudoers
  6. bin/sudo
  7. bin/sudoedit
  8. bin/sudoreplay
  9. @sample etc/pam.d/sudo.default etc/pam.d/sudo
  10. @sample etc/sudo.conf.sample
  11. @sample etc/sudo_logsrvd.conf.sample
  12. @sample etc/sudoers.dist etc/sudoers
  13. include/sudo_plugin.h
  14. libexec/sudo/audit_json.so
  15. libexec/sudo/group_file.so
  16. libexec/sudo/libsudo_util.so
  17. libexec/sudo/libsudo_util.so.0
  18. libexec/sudo/libsudo_util.so.0.0.0
  19. @comment libexec/sudo/python_plugin.so
  20. libexec/sudo/sample_approval.so
  21. libexec/sudo/sudo_intercept.so
  22. libexec/sudo/sudo_noexec.so
  23. libexec/sudo/sudoers.so
  24. libexec/sudo/system_group.so
  25. man/man1/cvtsudoers.1.gz
  26. man/man5/sudo.conf.5.gz
  27. man/man5/sudo_logsrv.proto.5.gz
  28. man/man5/sudo_logsrvd.conf.5.gz
  29. man/man5/sudoers.5.gz
  30. man/man5/sudoers_timestamp.5.gz
  31. @comment man/man5/sudoers.ldap.5.gz
  32. man/man8/sudo.8.gz
  33. man/man8/sudo_logsrvd.8.gz
  34. man/man8/sudo_plugin.8.gz
  35. @comment man/man8/sudo_plugin_python.8.gz
  36. man/man8/sudo_sendlog.8.gz
  37. man/man8/sudoedit.8.gz
  38. man/man8/sudoreplay.8.gz
  39. man/man8/visudo.8.gz
  40. sbin/visudo
  41. sbin/sudo_logsrvd
  42. sbin/sudo_sendlog
  43. share/doc/sudo/CONTRIBUTING.md
  44. share/doc/sudo/CONTRIBUTORS.md
  45. share/doc/sudo/ChangeLog
  46. share/doc/sudo/HISTORY.md
  47. share/doc/sudo/LICENSE.md
  48. share/doc/sudo/NEWS
  49. share/doc/sudo/README.md
  50. share/doc/sudo/SECURITY.md
  51. share/doc/sudo/TROUBLESHOOTING.md
  52. share/doc/sudo/UPGRADE.md
  53. @comment share/doc/sudo/README.LDAP.md
  54. @comment share/doc/sudo/schema.ActiveDirectory
  55. @comment share/doc/sudo/schema.OpenLDAP
  56. @comment share/doc/sudo/schema.iPlanet
  57. @comment share/doc/sudo/schema.olcSudo
  58. share/examples/sudo/cvtsudoers.conf
  59. share/examples/sudo/pam.conf
  60. share/examples/sudo/sudo.conf
  61. share/examples/sudo/sudo_logsrvd.conf
  62. share/examples/sudo/sudoers
  63. share/examples/sudo/syslog.conf
  64. @comment share/examples/sudo/example_approval_plugin.py
  65. @comment share/examples/sudo/example_audit_plugin.py
  66. @comment share/examples/sudo/example_conversation.py
  67. @comment share/examples/sudo/example_debugging.py
  68. @comment share/examples/sudo/example_group_plugin.py
  69. @comment share/examples/sudo/example_io_plugin.py
  70. @comment share/examples/sudo/example_policy_plugin.py
  71. share/locale/ast/LC_MESSAGES/sudo.mo
  72. share/locale/ast/LC_MESSAGES/sudoers.mo
  73. share/locale/ca/LC_MESSAGES/sudo.mo
  74. share/locale/ca/LC_MESSAGES/sudoers.mo
  75. share/locale/cs/LC_MESSAGES/sudo.mo
  76. share/locale/cs/LC_MESSAGES/sudoers.mo
  77. share/locale/da/LC_MESSAGES/sudo.mo
  78. share/locale/da/LC_MESSAGES/sudoers.mo
  79. share/locale/de/LC_MESSAGES/sudo.mo
  80. share/locale/de/LC_MESSAGES/sudoers.mo
  81. share/locale/el/LC_MESSAGES/sudoers.mo
  82. share/locale/eo/LC_MESSAGES/sudo.mo
  83. share/locale/eo/LC_MESSAGES/sudoers.mo
  84. share/locale/es/LC_MESSAGES/sudo.mo
  85. share/locale/es/LC_MESSAGES/sudoers.mo
  86. share/locale/eu/LC_MESSAGES/sudo.mo
  87. share/locale/eu/LC_MESSAGES/sudoers.mo
  88. share/locale/fa/LC_MESSAGES/sudo.mo
  89. share/locale/fi/LC_MESSAGES/sudo.mo
  90. share/locale/fi/LC_MESSAGES/sudoers.mo
  91. share/locale/fr/LC_MESSAGES/sudo.mo
  92. share/locale/fr/LC_MESSAGES/sudoers.mo
  93. share/locale/fur/LC_MESSAGES/sudo.mo
  94. share/locale/fur/LC_MESSAGES/sudoers.mo
  95. share/locale/gl/LC_MESSAGES/sudo.mo
  96. share/locale/hr/LC_MESSAGES/sudo.mo
  97. share/locale/hr/LC_MESSAGES/sudoers.mo
  98. share/locale/hu/LC_MESSAGES/sudo.mo
  99. share/locale/hu/LC_MESSAGES/sudoers.mo
  100. share/locale/it/LC_MESSAGES/sudo.mo
  101. share/locale/it/LC_MESSAGES/sudoers.mo
  102. share/locale/ja/LC_MESSAGES/sudo.mo
  103. share/locale/ja/LC_MESSAGES/sudoers.mo
  104. share/locale/ko/LC_MESSAGES/sudo.mo
  105. share/locale/ko/LC_MESSAGES/sudoers.mo
  106. share/locale/lt/LC_MESSAGES/sudoers.mo
  107. share/locale/nb/LC_MESSAGES/sudo.mo
  108. share/locale/nb/LC_MESSAGES/sudoers.mo
  109. share/locale/nl/LC_MESSAGES/sudo.mo
  110. share/locale/nl/LC_MESSAGES/sudoers.mo
  111. share/locale/nn/LC_MESSAGES/sudo.mo
  112. share/locale/pl/LC_MESSAGES/sudo.mo
  113. share/locale/pl/LC_MESSAGES/sudoers.mo
  114. share/locale/pt/LC_MESSAGES/sudo.mo
  115. share/locale/pt/LC_MESSAGES/sudoers.mo
  116. share/locale/pt_BR/LC_MESSAGES/sudo.mo
  117. share/locale/pt_BR/LC_MESSAGES/sudoers.mo
  118. share/locale/ro/LC_MESSAGES/sudo.mo
  119. share/locale/ro/LC_MESSAGES/sudoers.mo
  120. share/locale/ru/LC_MESSAGES/sudo.mo
  121. share/locale/ru/LC_MESSAGES/sudoers.mo
  122. share/locale/sk/LC_MESSAGES/sudo.mo
  123. share/locale/sk/LC_MESSAGES/sudoers.mo
  124. share/locale/sl/LC_MESSAGES/sudo.mo
  125. share/locale/sl/LC_MESSAGES/sudoers.mo
  126. share/locale/sr/LC_MESSAGES/sudo.mo
  127. share/locale/sr/LC_MESSAGES/sudoers.mo
  128. share/locale/sv/LC_MESSAGES/sudo.mo
  129. share/locale/sv/LC_MESSAGES/sudoers.mo
  130. share/locale/tr/LC_MESSAGES/sudo.mo
  131. share/locale/tr/LC_MESSAGES/sudoers.mo
  132. share/locale/uk/LC_MESSAGES/sudo.mo
  133. share/locale/uk/LC_MESSAGES/sudoers.mo
  134. share/locale/vi/LC_MESSAGES/sudo.mo
  135. share/locale/vi/LC_MESSAGES/sudoers.mo
  136. share/locale/zh_CN/LC_MESSAGES/sudo.mo
  137. share/locale/zh_CN/LC_MESSAGES/sudoers.mo
  138. share/locale/zh_TW/LC_MESSAGES/sudo.mo
  139. share/locale/zh_TW/LC_MESSAGES/sudoers.mo
  140. @dir etc/sudoers.d
  141. @dir /var/db/sudo/lectured
  142. @dir /var/db/sudo
  143. @dir /var/run/sudo
  144. @owner
  145. @group
  146. @mode
Collapse this list.
Dependency lines:
  • sudo>0:security/sudo
To install the port:
cd /usr/ports/security/sudo/ && make install clean
To add the package, run one of these commands:
  • pkg install security/sudo
  • pkg install sudo
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: sudo
Flavors: there is no flavor information for this port.
distinfo:
Packages (timestamps in pop-ups are UTC):
sudo
ABIlatestquarterly
FreeBSD:11:aarch641.8.25p11.9.2
FreeBSD:11:amd641.9.8p11.9.8
FreeBSD:11:armv61.8.171.9.2
FreeBSD:11:i3861.9.8p11.9.8
FreeBSD:11:mips--
FreeBSD:11:mips641.8.17p11.9.2
FreeBSD:12:aarch641.8.25p11.9.10
FreeBSD:12:amd641.9.101.9.10
FreeBSD:12:armv61.8.25p11.9.3p1
FreeBSD:12:armv71.8.25p11.9.3p1
FreeBSD:12:i3861.9.101.9.10
FreeBSD:12:mips--
FreeBSD:12:mips641.8.25p11.9.2
FreeBSD:12:powerpc64-1.9.6p1
FreeBSD:13:aarch641.9.101.9.10
FreeBSD:13:amd641.9.101.9.10
FreeBSD:13:armv61.9.5p11.9.10
FreeBSD:13:armv71.9.5p11.9.10
FreeBSD:13:i3861.9.101.9.10
FreeBSD:13:mips--
FreeBSD:13:mips641.9.5p11.9.5p2
FreeBSD:13:powerpc641.9.4p21.9.7p1
FreeBSD:14:aarch641.9.10-
FreeBSD:14:amd641.9.10-
FreeBSD:14:armv61.9.10-
FreeBSD:14:armv71.9.10-
FreeBSD:14:i3861.9.10-
FreeBSD:14:mips--
FreeBSD:14:mips64--
FreeBSD:14:powerpc641.9.6p1-
 

Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. msgfmt : devel/gettext-tools
Library dependencies:
  1. libintl.so : devel/gettext-runtime
This port is required by:
for Build
  1. devel/p5-IPC-ShellCmd

Deleted ports which required this port:

Expand this list of 1 deleted port
  1. sysutils/confman*
  2. Collapse this list of deleted ports.
for Run
  1. benchmarks/phoronix-test-suite
  2. databases/cego
  3. devel/p5-IPC-ShellCmd
  4. multimedia/zoneminder
  5. net/cloud-init
  6. net-mgmt/librenms
  7. net-mgmt/networkmgr
Expand this list (45 items / 38 hidden - sorry, this count includes any deleted ports)
  1. Collapse this list).
  2. net-mgmt/observium
  3. ports-mgmt/porttools
  4. security/lxqt-sudo
  5. security/veracrypt
  6. sysutils/azure-agent
  7. sysutils/brut
  8. sysutils/cbsd
  9. sysutils/fpart
  10. sysutils/libgksu
  11. sysutils/mountsmb2
  12. sysutils/mybashburn
  13. sysutils/omnibackup
  14. sysutils/puppetserver6
  15. sysutils/puppetserver7
  16. sysutils/py-google-compute-engine
  17. sysutils/qsudo
  18. sysutils/reggae
  19. sysutils/zogftw
  20. www/ilias
  21. www/varnish-nagios
  22. x11/deforaos-panel
  23. x11-wm/nscde
  24. Collapse this list.

Deleted ports which required this port:

Expand this list of 16 deleted ports
  1. deskutils/q4wine*
  2. devel/ros*
  3. emulators/playonbsd*
  4. emulators/q4wine*
  5. multimedia/zoneminder-h264*
  6. net/google-daemon*
  7. net/smb4k-kde4*
  8. security/sudosh*
  9. security/sudosh2*
  10. security/sudosh3*
  11. security/truecrypt*
  12. sysutils/bashburn*
  13. sysutils/confman*
  14. sysutils/empower*
  15. sysutils/realsync*
  16. x11-wm/fvwm-crystal*
  17. Collapse this list of deleted ports.
* - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

Configuration Options:
Options name:

USES:

FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (27 items)
Collapse this list.
  1. ftp://core.ring.gr.jp/pub/misc/sudo/
  2. ftp://ftp.arcane-networks.fr/pub/mirrors/sudo/
  3. ftp://ftp.cin.nihon-u.ac.jp/pub/misc/sudo/
  4. ftp://ftp.cs.tu-berlin.de/pub/misc/sudo/
  5. ftp://ftp.in2p3.fr/pub/sudo/
  6. ftp://ftp.informatik.uni-hamburg.de/pub/os/unix/utils/sudo/
  7. ftp://ftp.ring.gr.jp/pub/misc/sudo/
  8. ftp://ftp.st.ryukoku.ac.jp/pub/security/tool/sudo/
  9. ftp://ftp.sudo.ws/pub/sudo/
  10. ftp://ftp.tuwien.ac.at/utils/admin-tools/sudo/
  11. ftp://ftp.twaren.net/Unix/Security/Sudo/
  12. ftp://ftp.usbm.de/pub/sudo/
  13. ftp://ftp.uwsg.indiana.edu/pub/security/sudo/
  14. ftp://mirror.cdmon.com/pub/sudo/
  15. ftp://obsd.isc.org/pub/sudo/
  16. ftp://plier.ucar.edu/pub/sudo/
  17. ftp://sunsite.icm.edu.pl/packages/sudo/
  18. ftp://sunsite.ualberta.ca/pub/Mirror/sudo/
  19. ftp://zoot.tele.dk/pub/sudo/
  20. http://core.ring.gr.jp/archives/misc/sudo/
  21. http://ftp.arcane-networks.fr/pub/mirrors/sudo/
  22. http://ftp.twaren.net/Unix/Security/Sudo/
  23. http://sudo-ftp.basemirror.de/
  24. http://sudo.cybermirror.org/
  25. http://sudo.p8ra.de/sudo/dist/
  26. http://www.ring.gr.jp/archives/misc/sudo/
  27. https://www.sudo.ws/sudo/dist/
Collapse this list.

Number of commits found: 233 (showing only 100 on this page)

1 | 2 | 3  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
04 Mar 2022 15:04:25
 files touched by this commit commit hash:c003f33dda3c873c738c9095c6881ae272d32f2c  1.9.10
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.10

PR:		262331
Approved by:	garga (maintainer)
02 Feb 2022 11:04:53
 files touched by this commit commit hash:af389a6c018ae76f32af18a87031e63c17e300e7  1.9.9
Renato Botelho (garga) search for other commits by this committer
Author: Yasuhiro Kimura
security/sudo: Update to 1.9.9

PR:		261529
Sponsored by:	Rubicon Communications, LLC ("Netgate")
30 Sep 2021 13:51:29
 files touched by this commit commit hash:3c5b4dac33fa23d0cb8464556adfcf8a5d097c5b  1.9.8p2
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.8p2

Major changes between sudo 1.9.8p2 and 1.9.8p1:

 * Fixed a potential out-of-bounds read with "sudo -i" when the
   target user's shell is bash.  This is a regression introduced
   in sudo 1.9.8.  Bug #998.

 * sudo_logsrvd now only sends a log ID for first command of a session.
   There is no need to send the log ID for each sub-command.

 * Fixed a few minor memory leaks in intercept mode.

 * Fixed a problem with sudo_logsrvd in relay mode if "store_first"
   was enabled when handling sub-commands.  A new zero-length journal
   file was created for each sub-command instead of simply using
   the existing journal file.

PR:		258666
Submitted by:	cy
Reported by:	cy
Approved by:	garga (maintainer)
MFH:		2021Q3
17 Sep 2021 15:33:01
 files touched by this commit commit hash:549e87a5edcd9b96360d74b58dbfc04749bd0580  1.9.8p1
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.8p1 to fix LDAP SEGFAULT

Sudo version 1.9.8 patchelevel 1 is now available which fixes a few
regressions introduced in sudo 1.9.8.

Source:
    https://www.sudo.ws/dist/sudo-1.9.8p1.tar.gz
    ftp://ftp.sudo.ws/pub/sudo/sudo-1.9.8p1.tar.gz

SHA256 checksum:
    0939ee24df7095a92e0ca4aa3bd53b2a10965a7b921d51a26ab70cdd24388d69
MD5 checksum:
    ae9c8b32268f27d05bcdcb8f0c04d461

Binary packages:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Sep 2021 16:50:22
 files touched by this commit commit hash:c403b7871cf09f123de4151bb77e8438f342075e  1.9.8
Cy Schubert (cy) search for other commits by this committer
securty/sudo: Update to 1.9.8

Major changes between sudo 1.9.8 and 1.9.7p2:

 * It is now possible to transparently intercepting sub-commands
   executed by the original command run via sudo.  Intercept support
   is implemented using LD_PRELOAD (or the equivalent supported by
   the system) and so has some limitations.  The two main limitations
   are that only dynamic executables are supported and only the
   execl, execle, execlp, execv, execve, execvp, and execvpe library
   functions are currently intercepted. Its main use case is to
   support restricting privileged shells run via sudo.

   To support this, there is a new "intercept" Defaults setting and
   an INTERCEPT command tag that can be used in sudoers.  For example:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
13 Aug 2021 13:10:44
 files touched by this commit commit hash:6aeff2e8d145527738a0fc5cec87c9e2e122ef81  1.9.7p2
Renato Botelho (garga) search for other commits by this committer
Author: Yasuhiro Kimura
security/sudo: Update to 1.9.7p2

Sponsored by:	Rubicon Communications, LLC ("Netgate")
14 Jun 2021 16:04:01
 files touched by this commit commit hash:f34318c566935213a6e7c4e2ac53a6b921a6e9f9  1.9.7p1
Cy Schubert (cy) search for other commits by this committer
securty/sudo: Update to 1.9.7p1

Major changes between sudo 1.9.7p1 and 1.9.7

 * Fixed an SELinux sudoedit bug when the edited temporary file
   could not be opened.  The sesh helper would still be run even
   when there are no temporary files available to install.

 * Fixed a compilation problem on FreeBSD.

 * The sudo_noexec.so file is now built as a module on all systems
   other than macOS.  This makes it possible to use other libtool
   implementations such as slibtool.  On macOS shared libraries and
   modules are not interchangeable and the version of libtool shipped
   with sudo must be used.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
18 May 2021 20:07:09
 files touched by this commit commit hash:72d1eb161b86e663242d192171078d6babc1afdf  1.9.7
Cy Schubert (cy) search for other commits by this committer
security/sudo: update to 1.9.7

Among other changes this release fixes -fcommon errors. A complete list
of changes can be found at https://www.sudo.ws/stable.html/

PR:		255812
Submitted by:	Yasuhiro Kimura <yasu@utahime.org> (mostly)
Reported by:	Yasuhiro Kimura <yasu@utahime.org>
Tested by:	cy
Approved by:	garga (maintainer)
MFH:		2021Q2
06 Apr 2021 14:31:13
 files touched by this commit commit hash:135fdeebb99c3569e42d8162b265e15d29bd937d  1.9.6p1
Mathieu Arnold (mat) search for other commits by this committer
all: Remove all other $FreeBSD keywords.
06 Apr 2021 14:31:07
 files touched by this commit commit hash:305f148f482daf30dcf728039d03d019f88344eb  1.9.6p1
Mathieu Arnold (mat) search for other commits by this committer
Remove # $FreeBSD$ from Makefiles.
17 Mar 2021 11:56:41
Original commit files touched by this commit Revision:568647  1.9.6p1
garga search for other commits by this committer
security/sudo: Update to 1.9.6p1

PR:		254260
Submitted by:	Yasuhiro Kimura <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC ("Netgate")
26 Jan 2021 20:15:31
Original commit files touched by this commit Revision:562997  1.9.5p2
cy search for other commits by this committer
security/sudo - update 1.9.5p1 to 1.9.5p2

	(text/plain)
Sudo version 1.9.5p2 is now available which fixes CVE-2021-3156
(aka Baron Samedit), a severe security vulnerability in sudo versions
1.8.2 through 1.9.5p1.  For more details, see:
    https://www.sudo.ws/alerts/unescape_overflow.html
    https://www.openwall.com/lists/oss-security/2021/01/26/3

Source:
    https://www.sudo.ws/dist/sudo-1.9.5p2.tar.gz
    ftp://ftp.sudo.ws/pub/sudo/sudo-1.9.5p2.tar.gz
    SHA256 539e2ef43c8a55026697fb0474ab6a925a11206b5aa58710cb42a0e1c81f0978
    MD5 e6bc4c18c06346e6b3431637a2b5f3d5
(Only the first 15 lines of the commit message are shown above View all of this commit message)
12 Jan 2021 12:40:23
Original commit files touched by this commit Revision:561323  1.9.5p1 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.5p1

This version fixes a regression introduced by 1.9.5

Changelog: https://www.sudo.ws/stable.html#1.9.5p1

PR:		252598
Submitted by:	cy
MFH:		2021Q1
Sponsored by:	Rubicon Communications, LLC (Netgate)
11 Jan 2021 20:06:29
Original commit files touched by this commit Revision:561259  1.9.5 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.9.4p2 --> 1.9.5

PR:		252583
Submitted by:	cy
Reported by:	cy
Approved by:	garga (maintainer)
MFH:		2021Q1
Security:	CVE-2021-23239
21 Dec 2020 16:54:42
Original commit files touched by this commit Revision:558844  1.9.4p2 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Fix version

Use PORTVERSION here to end up with 1.9.4p2, which is considered newer than
previous one (1.9.4_1)

Reported by:	ohauer <ohauer@gmx.de>
21 Dec 2020 12:44:16
Original commit files touched by this commit Revision:558816  1.9.4.p2 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.4p2

PR:		251930
Submitted by:	Yasuhiro Kimura <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
07 Dec 2020 12:43:25
Original commit files touched by this commit Revision:557225  1.9.4_1 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Fix build without sendmail

PR:		251582
Reported by:	Alexander Kuznetsov <alex@kuznetcoff.ru>
Obtained from:	https://www.sudo.ws/repos/sudo/raw-rev/41db1aad85bb
Sponsored by:	Rubicon Communications, LLC (Netgate)
04 Dec 2020 12:32:14
Original commit files touched by this commit Revision:556978  1.9.4 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.4

PR:		251488
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
18 Nov 2020 12:22:20
Original commit files touched by this commit Revision:555641  1.9.3p1 This port version is marked as vulnerable.
rene search for other commits by this committer
security/sudo: readd option for SSSD, reverting r553505
27 Oct 2020 22:17:10
Original commit files touched by this commit Revision:553505  1.9.3p1 This port version is marked as vulnerable.
rene search for other commits by this committer
security/sudo: remove optional expired dependency on security/sssd
24 Sep 2020 18:53:54
Original commit files touched by this commit Revision:549938  1.9.3p1 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.3p1

PR:		249566
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
22 Sep 2020 13:25:17
Original commit files touched by this commit Revision:549590  1.9.3 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.3

PR:		249511
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
22 Jul 2020 17:17:21
Original commit files touched by this commit Revision:542878  1.9.2 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.9.1 --> 1.9.2

Major changes between sudo 1.9.2 and 1.9.1

 * The configure script now uses pkg-config to find the openssl
   cflags and libs where possible.

 * The contents of the log.json I/O log file is now documented in
   the sudoers manual.

 * The sudoers plugin now properly exports the sudoers_audit symbol
   on systems where the compiler lacks symbol visibility controls.
   This caused a regression in 1.9.1 where a successful sudo command
   was not logged due to the missing audit plugin.  Bug #931.

 * Fixed a regression introduced in 1.9.1 that can result in crash
   when there is a syntax error in the sudoers file.  Bug #934.

PR:		248179
Submitted by:	cy
Reported by:	cy
Approved by:	garga
Obtained from:	sudo-announce mailing list
MFH:		2020Q3 (because of regression fix)
19 Jun 2020 14:22:34
Original commit files touched by this commit Revision:539616  1.9.1 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.1

* Add new option PYTHON that enables python plugin support

PR:		246472
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
28 Mar 2020 09:32:15
Original commit files touched by this commit Revision:529324  1.8.31p1 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Update WWW

Approved by:	portmgr blanket
18 Mar 2020 14:01:53
Original commit files touched by this commit Revision:528649  1.8.31p1 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.31p1

Sponsored by:	Rubicon Communications, LLC (Netgate)
31 Jan 2020 13:59:20
Original commit files touched by this commit Revision:524707  1.8.31 This port version is marked as vulnerable.
cy search for other commits by this committer
security/sudo update 1.8.30 --> 1.8.31

PR:		243745
Submitted by:	cy@
Reported by:	cy@
Approved by:	garga@
MFH:		2020Q1
Security:	 CVE-2019-18634
02 Jan 2020 18:18:39
Original commit files touched by this commit Revision:521863  1.8.30 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.29 --> 1.8.30

PR:		243009
Submitted by:	cy
Approved by:	garga (maintainer)
MFH:		2020Q1
29 Oct 2019 18:42:28
Original commit files touched by this commit Revision:516027  1.8.29 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.29

Sponsored by:	Rubicon Communications, LLC (Netgate)
16 Oct 2019 18:52:21
Original commit files touched by this commit Revision:514608  1.8.28p1 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Fix wrong version added in r514607 using PORTVERSION

Reported by:	Herbert J. Skuhra <herbert@gojira.at>
Sponsored by:	Rubicon Communications, LLC (Netgate)
16 Oct 2019 18:37:52
Original commit files touched by this commit Revision:514607  1.8.28.p1 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.28p1

MFH:		2019Q4
Sponsored by:	Rubicon Communications, LLC (Netgate)
14 Oct 2019 16:46:28
Original commit files touched by this commit Revision:514465  1.8.28 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.28

Sponsored by:	Rubicon Communications, LLC (Netgate)
22 Jan 2019 13:51:16
Original commit files touched by this commit Revision:490951  1.8.27_1 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Fix listpw=never

When listpw=never is set, 'sudo -l' is expected to run without asking for a
password.

PR:		234756
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://bugzilla.sudo.ws/show_bug.cgi?id=869
Sponsored by:	Rubicon Communications, LLC (Netgate)
14 Jan 2019 12:52:00
Original commit files touched by this commit Revision:490251  1.8.27 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.26 --> 1.8.27

Notable changes:

 * Fixes and clarifications to the sudo plugin documentation.

 * The sudo manuals no longer require extensive post-processing to
   hide system-specific features.  Conditionals in the roff source
   are now used instead.  This fixes corruption of the sudo manual
   on systems without BSD login classes.  Bug #861.

 * If an I/O logging plugin is configured but the plugin does not
   actually log any I/O, sudo will no longer force the command to
   be run in a pseudo-tty.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
14 Nov 2018 15:33:04
Original commit files touched by this commit Revision:484929  1.8.26 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.26

PR:		233206 (based on)
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
13 Sep 2018 16:49:51
Original commit files touched by this commit Revision:479679  1.8.25p1 This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.25p1

Sponsored by:	Rubicon Communications, LLC (Netgate)
04 Sep 2018 11:42:58
Original commit files touched by this commit Revision:478950  1.8.25 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.25

Sponsored by:	Rubicon Communications, LLC (Netgate)
20 Aug 2018 14:23:53
Original commit files touched by this commit Revision:477656  1.8.24 This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.24

PR:		230739
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
03 May 2018 18:57:15
Original commit files touched by this commit Revision:468974  1.8.23_2 This port version is marked as vulnerable.
garga search for other commits by this committer
Add --rundir definition to CONFIGURE_ARGS to make sure configure script uses
/var/run/sudo. Without it, on a system that has /run directory, configure
will by default define rundir to /run/sudo

Reported by:	Walter Schwarzenfeld <w.schwarzenfeld@utanet.at>
Sponsored by:	Rubicon Communications, LLC (Netgate)
03 May 2018 12:36:26
Original commit files touched by this commit Revision:468922  1.8.23_1 This port version is marked as vulnerable.
garga search for other commits by this committer
Fix PLIST without LDAP

PR:		227926
Reported by:	O. Hartmann
Sponsored by:	Rubicon Communications, LLC (Netgate)
02 May 2018 13:09:38
Original commit files touched by this commit Revision:468828  1.8.23 This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.23

PR:		227900
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
24 Apr 2018 16:52:49
Original commit files touched by this commit Revision:468221  1.8.22_5 This port version is marked as vulnerable.
garga search for other commits by this committer
Add a new version of the patch committed in r468197 that fixes a regression
introduced by that version.

PR:		223587
Submitted by:	Todd C. Miller <Todd.Miller@sudo.ws>
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://bugzilla.sudo.ws/show_bug.cgi?id=831
MFH:		2018Q2
Sponsored by:	Rubicon Communications, LLC (Netgate)
24 Apr 2018 11:07:12
Original commit files touched by this commit Revision:468197  1.8.22_4 This port version is marked as vulnerable.
garga search for other commits by this committer
Add a patch to fix cryptographic digest in command specification for shell
scripts and other interpreted files. Error happens because fexecve() requires
/dev/fd to be mounted. This patch detects if /dev/fd/N exists before attempt
to use fexecve and workaround the issue.

PR:		223587
Submitted by:	Todd C. Miller <Todd.Miller@sudo.ws>
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://bugzilla.sudo.ws/show_bug.cgi?id=831
MFH:		2018Q2
Sponsored by:	Rubicon Communications, LLC (Netgate)
23 Apr 2018 18:43:45
Original commit files touched by this commit Revision:468130  1.8.22_3 This port version is marked as vulnerable.
garga search for other commits by this committer
Last commit was supposed to be a local change for testing. Patch was not yet
ready for production. Reverting it for now.
23 Apr 2018 18:40:50
Original commit files touched by this commit Revision:468129  1.8.22_2 This port version is marked as vulnerable.
garga search for other commits by this committer
Add a patch to fix cryptographic digest in command specification for shell
scripts and other interpreted files. Error happens because fexecve() requires
/dev/fd to be mounted. This patch detects if /dev/fd/N exists before attempt
to use fexecve and workaround the issue.

PR:		223587
Submitted by:	Todd C. Miller <Todd.Miller@sudo.ws>
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://www.sudo.ws/repos/sudo/rev/30f7c5d64104
MFH:		2018Q2
Sponsored by:	Rubicon Communications, LLC (Netgate)
19 Apr 2018 13:11:34
Original commit files touched by this commit Revision:467768  1.8.22_1 This port version is marked as vulnerable.
garga search for other commits by this committer
- Add new options to security/sudo to make it possible to build it with
  kerberos support.
- Bump PORTREVISION

PR:		225498
Submitted by:	Cullum Smith <cullum@c0ffee.net>
Sponsored by:	Rubicon Communications, LLC (Netgate)
19 Apr 2018 13:09:58
Original commit files touched by this commit Revision:467767  1.8.22 This port version is marked as vulnerable.
garga search for other commits by this committer
Add an example of prompt that shows which user password is being expected.
It's useful when targetpw option is set to avoid confusion. PORTREVISION was
not bumped because a new commit is going to happen soon with one more change
and it will bump it.

PR:		221264
Submitted by:	Rebecca Cran <rebecca@bluestop.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
17 Jan 2018 15:07:51
Original commit files touched by this commit Revision:459262  1.8.22 This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.22

Sponsored by:	Rubicon Communications, LLC (Netgate)
13 Nov 2017 16:58:14
Original commit files touched by this commit Revision:454126  1.8.21p2_1 This port version is marked as vulnerable.
brd search for other commits by this committer
Pull in an upstream patch for security/sudo to not coredump if the hostname is
not set.

PR:		222510
Approved by:	garga
18 Sep 2017 16:47:41
Original commit files touched by this commit Revision:450054  1.8.21p2 This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.21p2

PR:		222194
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
05 Sep 2017 17:15:29
Original commit files touched by this commit Revision:449304  1.8.21p1 This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.21p1
29 Aug 2017 10:30:33
Original commit files touched by this commit Revision:448901  1.8.21 This port version is marked as vulnerable.
garga search for other commits by this committer
- Update security/sudo to 1.8.21

PR:		221874
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
		bdrewery (SIGINFO fix)
Sponsored by:	Rubicon Communications, LLC (Netgate)
11 Aug 2017 18:32:58
Original commit files touched by this commit Revision:447784  1.8.20p2_3 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
- Fix sudo sending a 2nd SIGINFO on ^T to processes, which is already
  handled by the kernel sending it to the entire controlling terminal's
  process group.
  - This fixes ^T with 'sudo poudriere ...' showing a status log twice.
  - This is intended to be upstreamed.

Approved by:	garga (maintainer)
Tested by:	swills, bdrewery
Reviewed/Discussed with:	kib
Reported by:	kwm, swills, bapt, dim, kib, many others
MFH:		2017Q3
27 Jun 2017 13:49:53
Original commit files touched by this commit Revision:444464  1.8.20p2_2 This port version is marked as vulnerable.
garga search for other commits by this committer
Fix the way ${PREFIX}/etc/sudoers.d is handled removing the workaround added in
r260609 and using @dir

PR:		220234
Submitted by:	Jose Luis Duran <jlduran@gmail.com>
Sponsored by:	Rubicon Communications (Netgate)
15 Jun 2017 11:01:34
Original commit files touched by this commit Revision:443616  1.8.20p2_1 This port version is marked as vulnerable.
mat search for other commits by this committer
Starting in 1.8.20, the sample sudoers file has been installed twice,
once as sudoers.sample and once as sudoers.dist. Remove one of them.

PR:		219708
Submitted by:	mat
Approved by:	maintainer timeout
Sponsored by:	Absolight
10 Jun 2017 14:10:26
Original commit files touched by this commit Revision:443091  1.8.20p2 This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.20p2

Sponsored by:	Rubicon Communications (Netgate)
31 May 2017 12:42:02
Original commit files touched by this commit Revision:442153  1.8.20p1 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.20 --> 1.8.20p1

This release fixes a potential security issue that may allow a user to
bypass the "tty_ticket" constraints or overwrite an arbitrary file.
The issue is reported to only be present on Linux systems but I don't
think it hurts to update the FreeBSD port at this time.

Approved by:		garga@ (maintainer)
MFH:			2017Q2
Differential Revision:	D10997
11 May 2017 17:03:08
Original commit files touched by this commit Revision:440636  1.8.20 This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.20

Sponsored by:	Rubicon Communications (Netgate)
16 Jan 2017 13:38:38
Original commit files touched by this commit Revision:431645  1.8.19p2 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.19p1 --> 1.8.19p2.

Major changes between sudo 1.8.19p2 and 1.8.19p1:

 * Fixed a crash in visudo introduced in sudo 1.8.9 when an IP address
   or network is used in a host-based Defaults entry.  Bug #766

 * Added a missing check for the ignore_iolog_errors flag when
   the sudoers plugin generates the I/O log file path name.

 * Fixed a typo in sudo's vsyslog() replacement that resulted in
   garbage being logged to syslog.

Approved by:	garga (maintainer)
MFH:		2917Q1
Differential Revision:	D9181
20 Dec 2016 21:11:07
Original commit files touched by this commit Revision:429031  1.8.19p1 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.19 --> 1.8.19p1

As per sudo announcement:

 * Fixed a bug introduced in sudo 1.8.19 that resulted in the wrong
   syslog priority and facility being used.

PR:		215447
Submitted by:	myself (in pr 215447)
Approved by:	garga (maintainer)
19 Dec 2016 23:59:23
Original commit files touched by this commit Revision:428967  1.8.19 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.18p1 --> 1.8.19.

PR:		215434
Submitted by:	cy
Reviewed by:	garga (maintainer)
28 Oct 2016 12:16:32
Original commit files touched by this commit Revision:424829  1.8.18p1 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.18 --> 1.8.18p1

From the sudo announcment:

Depending on your sudoers file configuration, the bug fixed in
1.8.18p1 may have a security impact.  For more information, see
https://www.sudo.ws/alerts/noexec_wordexp.html

Approved by:		garga@ (maintainer)
MFH:			2016Q4
Differential Revision:	D8363
21 Sep 2016 13:45:45
Original commit files touched by this commit Revision:422559  1.8.18 This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.18

Sponsored by:	Rubicon Communications (Netgate)
23 Jun 2016 00:55:19
Original commit files touched by this commit Revision:417338  1.8.17p1 This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.17p1

MFH:		2016Q2
Sponsored by:	Rubicon Communications (Netgate)
20 Jun 2016 14:03:04
Original commit files touched by this commit Revision:417158  1.8.17 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.16 --> 1.8.17

PR:		210407
Submitted by:	cy@
Approved by:	garga@
MFH:		2016Q2
11 Jun 2016 20:39:39
Original commit files touched by this commit Revision:416751  1.8.16_2 This port version is marked as vulnerable.
garga search for other commits by this committer
Add a patch to fix sudo bug #743 that causes a bug where it dereference
a NULL pointer when it looks up a negative cached entry which is stored
as a NULL passwd or group struct pointer

PR:		208198
Submitted by:	Fredrik Eriksson <fredrik.eriksson@loopia.se>
Obtained from:	https://www.sudo.ws/repos/sudo/rev/1d13341d53ec
Sponsored by:	Rubicon Communications (Netgate)
11 Jun 2016 20:11:14
Original commit files touched by this commit Revision:416749  1.8.16_1 This port version is marked as vulnerable.
garga search for other commits by this committer
- Stop forcing -lssp_nonshared since libc already include it in every link.
  It should fix build when world is built with WITHOUT_SSP
- Bump PORTREVISION

PR:		203380
Submitted by:	Kenneth Salerno <kennethsalerno@yahoo.com>
Sponsored by:	Rubicon Communications (Netgate)
01 Apr 2016 14:25:18
Original commit files touched by this commit Revision:412349  1.8.16 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
18 Mar 2016 12:15:26
Original commit files touched by this commit Revision:411346  1.8.16 This port version is marked as vulnerable.
garga search for other commits by this committer
- Update security/sudo to 1.8.16 [1]
- Pet portlint using (pre|post)[un]exec items in plist

PR:		208111 [1]
Submitted by:	cy [1]
Sponsored by:	Rubicon Communications (Netgate)
03 Nov 2015 09:44:23
Original commit files touched by this commit Revision:400688  1.8.15 This port version is marked as vulnerable.
garga search for other commits by this committer
- Update security/sudo to 1.8.15
- Remove patch-plugins__sudoers__Makefile.in, unnecessary on stagedir days
- Remove patch-plugins__sudoers__audit.c, sudo_gettext.h is already included
  by sudoers.h
- Rework patch-plugins__sudoers__sudoers.in to replace pkg_* utilities by
  pkg on message
22 Jul 2015 13:34:16
Original commit files touched by this commit Revision:392680  1.8.14p3 This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.14p3
21 Jul 2015 12:28:18
Original commit files touched by this commit Revision:392625  1.8.14p2 This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.14p2
20 Jul 2015 13:13:01
Original commit files touched by this commit Revision:392568  1.8.14p1_1 This port version is marked as vulnerable.
garga search for other commits by this committer
- Fix installation with DOCS broken by my last commit
- Bump PORTREVISION

Pointyhat to:	garga
20 Jul 2015 12:30:55
Original commit files touched by this commit Revision:392564  1.8.14p1 This port version is marked as vulnerable.
garga search for other commits by this committer
- Replace DISTVERSION by PORTVERSION otherwise it ends up as 1.8.14.p1,
  what is < 1.8.14. [1]
- While I'm here silence portlint warnings re-generating patches with
  make makepatch and removing unnecessary DOCS check

Reported by:	Robert Burmeister [1]
19 Jul 2015 13:02:39
Original commit files touched by this commit Revision:392505  1.8.14.p1 This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.14p1
17 Jul 2015 13:15:18
Original commit files touched by this commit Revision:392376  1.8.14 This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.14
14 May 2015 10:15:09
Original commit files touched by this commit Revision:386312  1.8.13 This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
15 Apr 2015 10:00:32
Original commit files touched by this commit Revision:384041  1.8.13 This port version is marked as vulnerable.
robak search for other commits by this committer
security/sudo: add CPE info

PR:		199367
Submitted by:	Shun <shun.fbsd.pr@dropcut.net>
Approved by:	portmgr blanket
23 Mar 2015 11:39:49
Original commit files touched by this commit Revision:381987  1.8.13 This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.13
10 Feb 2015 15:58:44
Original commit files touched by this commit Revision:378779  1.8.12 This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.12
29 Dec 2014 03:39:52
Original commit files touched by this commit Revision:375769  1.8.11.p1 This port version is marked as vulnerable.
wxs search for other commits by this committer
Over to garga@.

I don't have the cycles to handle these higher profile ports anymore.
16 Oct 2014 02:05:18
Original commit files touched by this commit Revision:370967  1.8.11.p1 This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.8.11p1

PR:		194259
Submitted by:	cy@ and Yasuhiro KIMURA <yasu@utahime.org>
22 Sep 2014 15:38:19
Original commit files touched by this commit Revision:368965  1.8.10.p3_1 This port version is marked as vulnerable.
bapt search for other commits by this committer
Simplify plist
11 Sep 2014 23:17:13
Original commit files touched by this commit Revision:367995  1.8.10.p3_1 This port version is marked as vulnerable.
bdrewery search for other commits by this committer
Use @sample for sudoers
24 Jul 2014 18:34:16
Original commit files touched by this commit Revision:362835  1.8.10.p3_1 This port version is marked as vulnerable.
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
15 Jul 2014 16:57:39
Original commit files touched by this commit Revision:361977  1.8.10.p3 This port version is marked as vulnerable.
adamw search for other commits by this committer
Add DOCS to OPTIONS_DEFINE to ports that check for PORT_OPTIONS:MDOCS.
08 May 2014 03:27:07
Original commit files touched by this commit Revision:353250  1.8.10.p3 This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.8.10p3.
12 Apr 2014 02:24:09
Original commit files touched by this commit Revision:351059  1.8.10.p2 This port version is marked as vulnerable.
wxs search for other commits by this committer
Add option for sssd.

Submitted by:	petef@
17 Mar 2014 17:55:58
Original commit files touched by this commit Revision:348496  1.8.10.p2 This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.8.10p2.

PR:		ports/187567
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
04 Mar 2014 01:10:18
Original commit files touched by this commit Revision:346984  1.8.9.p5 This port version is marked as vulnerable.
adamw search for other commits by this committer
Use OPTIONS helpers.
08 Feb 2014 21:48:05
Original commit files touched by this commit Revision:343397  1.8.9.p5 This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.8.9p5.

PR:		ports/185581
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
10 Oct 2013 13:28:12
Original commit files touched by this commit Revision:329993  1.8.8 This port version is marked as vulnerable.
wxs search for other commits by this committer
[1]: Update to 1.8.8.
[2]: Switch logging to authpriv.

PR:		[1] ports/182618
Submitted by:	[1] Yasuhiro KIMURA <yasu@utahime.org>
		[2] des@
20 Sep 2013 22:55:26
Original commit files touched by this commit Revision:327769  1.8.7_1 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
14 Aug 2013 22:35:54
Original commit files touched by this commit Revision:324744  1.8.7_1  Sanity Test Failure This port version is marked as vulnerable.
ak search for other commits by this committer
- Remove MAKE_JOBS_SAFE variable

Approved by:	portmgr (bdrewery)
17 Jul 2013 13:36:10
Original commit files touched by this commit Revision:323166  1.8.7_1 This port version is marked as vulnerable.
wxs search for other commits by this committer
Cleanup /var/db/sudo if it is empty. This eliminates leftovers when building
the package.
05 Jul 2013 18:46:34
Original commit files touched by this commit Revision:322347  1.8.7_1 This port version is marked as vulnerable.
wxs search for other commits by this committer
Fix missing include.

This was causing the "Undefined symbol '_'" message when hitting ^C or
entering an incorect command.

PR:		ports/180262
Submitted by:	Christophe Juniet <c.juniet@gmail.com>
28 Jun 2013 00:58:49
Original commit files touched by this commit Revision:321914  1.8.7 This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.8.7.
04 May 2013 22:30:31
Original commit files touched by this commit Revision:317387  1.8.6.p8 This port version is marked as vulnerable.
wxs search for other commits by this committer
Disable PIE on ARM. This was causing a crash at runtime.

Submitted by:	Lukasz Siemiradzki
24 Apr 2013 18:10:32
Original commit files touched by this commit Revision:316464  1.8.6.p8 This port version is marked as vulnerable.
ak search for other commits by this committer
- Convert USE_GETTEXT to USES (part 3)

Approved by:	portmgr (bapt)
16 Apr 2013 15:30:52
Original commit files touched by this commit Revision:315822  1.8.6.p8 This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.8.6p8.

Feature safe:	yes

Number of commits found: 233 (showing only 100 on this page)

1 | 2 | 3  »