notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Ukraine
Some details on the 2023-01-16 website outage.
We just rebooted with several updates: * new HMTLify code * no port maintainer is now highly visible (e.g. https://freshports.org/security/sssd/) * fixed search logic error when using plain/ text details at https://github.com/FreshPorts/freshports/releases/tag/2.2.34
Port details
sudo Allow others to run commands as root
1.9.12p2 security on this many watch lists=497 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout Version of this port present on the latest quarterly branch.
Maintainer: garga@FreeBSD.org search for ports maintained by this maintainer
Port Added: unknown
Last Update: 2023-01-18 17:08:35
Commit Hash: 8f8bd81
People watching this port, also watch:: libiconv, gmake, expat, gettext, png
License: sudo
Description:
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb - no subversion history for this port
pkg-plist: as obtained via: make generate-plist
Expand this list (146 items)
Collapse this list.
  1. @ldconfig
  2. /usr/local/share/licenses/sudo-1.9.12p2/catalog.mk
  3. /usr/local/share/licenses/sudo-1.9.12p2/LICENSE
  4. /usr/local/share/licenses/sudo-1.9.12p2/sudo
  5. bin/cvtsudoers
  6. bin/sudo
  7. bin/sudoedit
  8. bin/sudoreplay
  9. @sample etc/pam.d/sudo.default etc/pam.d/sudo
  10. @sample etc/sudo.conf.sample
  11. @sample etc/sudo_logsrvd.conf.sample
  12. @sample etc/sudoers.dist etc/sudoers
  13. include/sudo_plugin.h
  14. libexec/sudo/audit_json.so
  15. libexec/sudo/group_file.so
  16. libexec/sudo/libsudo_util.so
  17. libexec/sudo/libsudo_util.so.0
  18. libexec/sudo/libsudo_util.so.0.0.0
  19. @comment libexec/sudo/python_plugin.so
  20. libexec/sudo/sudo_intercept.so
  21. libexec/sudo/sudo_noexec.so
  22. libexec/sudo/sudoers.so
  23. libexec/sudo/system_group.so
  24. man/man1/cvtsudoers.1.gz
  25. man/man5/sudo.conf.5.gz
  26. man/man5/sudo_logsrv.proto.5.gz
  27. man/man5/sudo_logsrvd.conf.5.gz
  28. man/man5/sudo_plugin.5.gz
  29. @comment man/man5/sudo_plugin_python.5.gz
  30. man/man5/sudoers.5.gz
  31. man/man5/sudoers_timestamp.5.gz
  32. @comment man/man5/sudoers.ldap.5.gz
  33. man/man8/sudo.8.gz
  34. man/man8/sudo_logsrvd.8.gz
  35. man/man8/sudo_sendlog.8.gz
  36. man/man8/sudoedit.8.gz
  37. man/man8/sudoreplay.8.gz
  38. man/man8/visudo.8.gz
  39. sbin/visudo
  40. sbin/sudo_logsrvd
  41. sbin/sudo_sendlog
  42. share/doc/sudo/CONTRIBUTING.md
  43. share/doc/sudo/CONTRIBUTORS.md
  44. share/doc/sudo/ChangeLog
  45. share/doc/sudo/HISTORY.md
  46. share/doc/sudo/LICENSE.md
  47. share/doc/sudo/NEWS
  48. share/doc/sudo/README.md
  49. share/doc/sudo/SECURITY.md
  50. share/doc/sudo/TROUBLESHOOTING.md
  51. share/doc/sudo/UPGRADE.md
  52. @comment share/doc/sudo/README.LDAP.md
  53. @comment share/doc/sudo/schema.ActiveDirectory
  54. @comment share/doc/sudo/schema.OpenLDAP
  55. @comment share/doc/sudo/schema.iPlanet
  56. @comment share/doc/sudo/schema.olcSudo
  57. share/examples/sudo/cvtsudoers.conf
  58. share/examples/sudo/pam.conf
  59. share/examples/sudo/sudo.conf
  60. share/examples/sudo/sudo_logsrvd.conf
  61. share/examples/sudo/sudoers
  62. share/examples/sudo/syslog.conf
  63. @comment share/examples/sudo/example_approval_plugin.py
  64. @comment share/examples/sudo/example_audit_plugin.py
  65. @comment share/examples/sudo/example_conversation.py
  66. @comment share/examples/sudo/example_debugging.py
  67. @comment share/examples/sudo/example_group_plugin.py
  68. @comment share/examples/sudo/example_io_plugin.py
  69. @comment share/examples/sudo/example_policy_plugin.py
  70. share/locale/ast/LC_MESSAGES/sudo.mo
  71. share/locale/ast/LC_MESSAGES/sudoers.mo
  72. share/locale/ca/LC_MESSAGES/sudo.mo
  73. share/locale/ca/LC_MESSAGES/sudoers.mo
  74. share/locale/cs/LC_MESSAGES/sudo.mo
  75. share/locale/cs/LC_MESSAGES/sudoers.mo
  76. share/locale/da/LC_MESSAGES/sudo.mo
  77. share/locale/da/LC_MESSAGES/sudoers.mo
  78. share/locale/de/LC_MESSAGES/sudo.mo
  79. share/locale/de/LC_MESSAGES/sudoers.mo
  80. share/locale/el/LC_MESSAGES/sudoers.mo
  81. share/locale/eo/LC_MESSAGES/sudo.mo
  82. share/locale/eo/LC_MESSAGES/sudoers.mo
  83. share/locale/es/LC_MESSAGES/sudo.mo
  84. share/locale/es/LC_MESSAGES/sudoers.mo
  85. share/locale/eu/LC_MESSAGES/sudo.mo
  86. share/locale/eu/LC_MESSAGES/sudoers.mo
  87. share/locale/fa/LC_MESSAGES/sudo.mo
  88. share/locale/fi/LC_MESSAGES/sudo.mo
  89. share/locale/fi/LC_MESSAGES/sudoers.mo
  90. share/locale/fr/LC_MESSAGES/sudo.mo
  91. share/locale/fr/LC_MESSAGES/sudoers.mo
  92. share/locale/fur/LC_MESSAGES/sudo.mo
  93. share/locale/fur/LC_MESSAGES/sudoers.mo
  94. share/locale/gl/LC_MESSAGES/sudo.mo
  95. share/locale/hr/LC_MESSAGES/sudo.mo
  96. share/locale/hr/LC_MESSAGES/sudoers.mo
  97. share/locale/hu/LC_MESSAGES/sudo.mo
  98. share/locale/hu/LC_MESSAGES/sudoers.mo
  99. share/locale/it/LC_MESSAGES/sudo.mo
  100. share/locale/it/LC_MESSAGES/sudoers.mo
  101. share/locale/ja/LC_MESSAGES/sudo.mo
  102. share/locale/ja/LC_MESSAGES/sudoers.mo
  103. share/locale/ka/LC_MESSAGES/sudo.mo
  104. share/locale/ko/LC_MESSAGES/sudo.mo
  105. share/locale/ko/LC_MESSAGES/sudoers.mo
  106. share/locale/lt/LC_MESSAGES/sudoers.mo
  107. share/locale/nb/LC_MESSAGES/sudo.mo
  108. share/locale/nb/LC_MESSAGES/sudoers.mo
  109. share/locale/nl/LC_MESSAGES/sudo.mo
  110. share/locale/nl/LC_MESSAGES/sudoers.mo
  111. share/locale/nn/LC_MESSAGES/sudo.mo
  112. share/locale/pl/LC_MESSAGES/sudo.mo
  113. share/locale/pl/LC_MESSAGES/sudoers.mo
  114. share/locale/pt/LC_MESSAGES/sudo.mo
  115. share/locale/pt/LC_MESSAGES/sudoers.mo
  116. share/locale/pt_BR/LC_MESSAGES/sudo.mo
  117. share/locale/pt_BR/LC_MESSAGES/sudoers.mo
  118. share/locale/ro/LC_MESSAGES/sudo.mo
  119. share/locale/ro/LC_MESSAGES/sudoers.mo
  120. share/locale/ru/LC_MESSAGES/sudo.mo
  121. share/locale/ru/LC_MESSAGES/sudoers.mo
  122. share/locale/sk/LC_MESSAGES/sudo.mo
  123. share/locale/sk/LC_MESSAGES/sudoers.mo
  124. share/locale/sl/LC_MESSAGES/sudo.mo
  125. share/locale/sl/LC_MESSAGES/sudoers.mo
  126. share/locale/sr/LC_MESSAGES/sudo.mo
  127. share/locale/sr/LC_MESSAGES/sudoers.mo
  128. share/locale/sv/LC_MESSAGES/sudo.mo
  129. share/locale/sv/LC_MESSAGES/sudoers.mo
  130. share/locale/tr/LC_MESSAGES/sudo.mo
  131. share/locale/tr/LC_MESSAGES/sudoers.mo
  132. share/locale/uk/LC_MESSAGES/sudo.mo
  133. share/locale/uk/LC_MESSAGES/sudoers.mo
  134. share/locale/vi/LC_MESSAGES/sudo.mo
  135. share/locale/vi/LC_MESSAGES/sudoers.mo
  136. share/locale/zh_CN/LC_MESSAGES/sudo.mo
  137. share/locale/zh_CN/LC_MESSAGES/sudoers.mo
  138. share/locale/zh_TW/LC_MESSAGES/sudo.mo
  139. share/locale/zh_TW/LC_MESSAGES/sudoers.mo
  140. @dir etc/sudoers.d
  141. @dir /var/db/sudo/lectured
  142. @dir /var/db/sudo
  143. @dir /var/run/sudo
  144. @owner
  145. @group
  146. @mode
Collapse this list.
Dependency lines:
  • sudo>0:security/sudo
To install the port:
cd /usr/ports/security/sudo/ && make install clean
To add the package, run one of these commands:
  • pkg install security/sudo
  • pkg install sudo
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: sudo
Flavors: there is no flavor information for this port.
distinfo:

Packages (timestamps in pop-ups are UTC):
sudo
ABIlatestquarterly
FreeBSD:11:aarch641.8.25p11.9.2
FreeBSD:11:amd641.9.8p11.9.8
FreeBSD:11:armv61.8.171.9.2
FreeBSD:11:i3861.9.8p11.9.8
FreeBSD:11:mipspkg-falloutpkg-fallout
FreeBSD:11:mips641.8.17p11.9.2
FreeBSD:12:aarch641.8.25p11.9.12p1
FreeBSD:12:amd641.9.12p21.9.12p2
FreeBSD:12:armv61.8.25p11.9.3p1
FreeBSD:12:armv71.8.25p11.9.3p1
FreeBSD:12:i3861.9.12p21.9.12p2
FreeBSD:12:mipspkg-falloutpkg-fallout
FreeBSD:12:mips641.8.25p11.9.2
FreeBSD:12:powerpc64pkg-fallout1.9.6p1
FreeBSD:13:aarch641.9.12p11.9.12p1
FreeBSD:13:amd641.9.12p21.9.12p2
FreeBSD:13:armv61.9.5p11.9.11p3
FreeBSD:13:armv71.9.12p11.9.12p1
FreeBSD:13:i3861.9.12p21.9.12p2
FreeBSD:13:mipspkg-falloutpkg-fallout
FreeBSD:13:mips641.9.5p11.9.5p2
FreeBSD:13:powerpc641.9.4p21.9.12p1
FreeBSD:13:riscv64pkg-fallout1.9.11p3
FreeBSD:14:aarch641.9.12p1pkg-fallout
FreeBSD:14:amd641.9.12p1pkg-fallout
FreeBSD:14:armv61.9.12p1pkg-fallout
FreeBSD:14:armv71.9.12p1pkg-fallout
FreeBSD:14:i3861.9.12p2pkg-fallout
FreeBSD:14:mipspkg-falloutpkg-fallout
FreeBSD:14:mips64pkg-falloutpkg-fallout
FreeBSD:14:powerpc641.9.12p1pkg-fallout
FreeBSD:14:riscv641.9.8p2pkg-fallout
 

Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. msgfmt : devel/gettext-tools
Library dependencies:
  1. libintl.so : devel/gettext-runtime
This port is required by:
for Build
  1. devel/p5-IPC-ShellCmd

Deleted ports which required this port:

Expand this list of 1 deleted port
  1. sysutils/confman*
  2. Collapse this list of deleted ports.
for Run
  1. benchmarks/phoronix-test-suite
  2. databases/cego
  3. devel/p5-IPC-ShellCmd
  4. devel/ruby-install
  5. multimedia/zoneminder
  6. net/cloud-init
  7. net/cloud-init-devel
Expand this list (49 items / 42 hidden - sorry, this count includes any deleted ports)
  1. Collapse this list).
  2. net-im/mastodon
  3. net-mgmt/librenms
  4. net-mgmt/networkmgr
  5. net-mgmt/observium
  6. ports-mgmt/porttools
  7. security/lxqt-sudo
  8. security/veracrypt
  9. sysutils/azure-agent
  10. sysutils/brut
  11. sysutils/cbsd
  12. sysutils/fpart
  13. sysutils/mountsmb2
  14. sysutils/mybashburn
  15. sysutils/omnibackup
  16. sysutils/puppetserver6
  17. sysutils/puppetserver7
  18. sysutils/py-google-compute-engine
  19. sysutils/qsudo
  20. sysutils/reggae
  21. sysutils/topgrade
  22. sysutils/zogftw
  23. www/ilias
  24. www/varnish-nagios
  25. x11/deforaos-panel
  26. x11-wm/nscde
  27. Collapse this list.

Deleted ports which required this port:

Expand this list of 17 deleted ports
  1. deskutils/q4wine*
  2. devel/ros*
  3. emulators/playonbsd*
  4. emulators/q4wine*
  5. multimedia/zoneminder-h264*
  6. net/google-daemon*
  7. net/smb4k-kde4*
  8. security/sudosh*
  9. security/sudosh2*
  10. security/sudosh3*
  11. security/truecrypt*
  12. sysutils/bashburn*
  13. sysutils/confman*
  14. sysutils/empower*
  15. sysutils/libgksu*
  16. sysutils/realsync*
  17. x11-wm/fvwm-crystal*
  18. Collapse this list of deleted ports.
* - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

Configuration Options:
Options name:

USES:

FreshPorts was unable to extract/find any pkg message

Master Sites:
Expand this list (27 items)
Collapse this list.
  1. ftp://core.ring.gr.jp/pub/misc/sudo/
  2. ftp://ftp.arcane-networks.fr/pub/mirrors/sudo/
  3. ftp://ftp.cin.nihon-u.ac.jp/pub/misc/sudo/
  4. ftp://ftp.cs.tu-berlin.de/pub/misc/sudo/
  5. ftp://ftp.in2p3.fr/pub/sudo/
  6. ftp://ftp.informatik.uni-hamburg.de/pub/os/unix/utils/sudo/
  7. ftp://ftp.ring.gr.jp/pub/misc/sudo/
  8. ftp://ftp.st.ryukoku.ac.jp/pub/security/tool/sudo/
  9. ftp://ftp.sudo.ws/pub/sudo/
  10. ftp://ftp.tuwien.ac.at/utils/admin-tools/sudo/
  11. ftp://ftp.twaren.net/Unix/Security/Sudo/
  12. ftp://ftp.usbm.de/pub/sudo/
  13. ftp://ftp.uwsg.indiana.edu/pub/security/sudo/
  14. ftp://mirror.cdmon.com/pub/sudo/
  15. ftp://obsd.isc.org/pub/sudo/
  16. ftp://plier.ucar.edu/pub/sudo/
  17. ftp://sunsite.icm.edu.pl/packages/sudo/
  18. ftp://sunsite.ualberta.ca/pub/Mirror/sudo/
  19. ftp://zoot.tele.dk/pub/sudo/
  20. http://core.ring.gr.jp/archives/misc/sudo/
  21. http://ftp.arcane-networks.fr/pub/mirrors/sudo/
  22. http://ftp.twaren.net/Unix/Security/Sudo/
  23. http://sudo-ftp.basemirror.de/
  24. http://sudo.cybermirror.org/
  25. http://sudo.p8ra.de/sudo/dist/
  26. http://www.ring.gr.jp/archives/misc/sudo/
  27. https://www.sudo.ws/sudo/dist/
Collapse this list.

Number of commits found: 244 (showing only 100 on this page)

1 | 2 | 3  »  

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
1.9.12p2
18 Jan 2023 17:08:35
commit hash:8f8bd813f3139d6f6ff35704808111c4ad1f053acommit hash:8f8bd813f3139d6f6ff35704808111c4ad1f053acommit hash:8f8bd813f3139d6f6ff35704808111c4ad1f053acommit hash:8f8bd813f3139d6f6ff35704808111c4ad1f053a files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.12p2

Major changes between sudo 1.9.12p2 and 1.9.12p1:

 * Fixed a compilation error on Linux/aarch64.  GitHub issue #197.

 * Fixed a potential crash introduced in the fix for GitHub issue #134.
   If a user's sudoers entry did not have any RunAs user's set,
   running "sudo -U otheruser -l" would dereference a NULL pointer.

 * Fixed a bug introduced in sudo 1.9.12 that could prevent sudo
   from creating a I/O files when the "iolog_file" sudoers setting
   contains six or more Xs.

 * Fixed CVE-2023-22809, a flaw in sudo's -e option (aka sudoedit)
   that coud allow a malicious user with sudoedit privileges to
   edit arbitrary files.

PR:		269030
Submitted by:	cy
Reported by:	cy
Approved by:	garga
MFH:		2023Q1
Security:	CVE-2023-22809
1.9.12p1
07 Nov 2022 15:33:45
commit hash:271b349b390a6036d501ed3d27c0189ff3d43e47commit hash:271b349b390a6036d501ed3d27c0189ff3d43e47commit hash:271b349b390a6036d501ed3d27c0189ff3d43e47commit hash:271b349b390a6036d501ed3d27c0189ff3d43e47 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.12p1

This release includes fixes to minor bugs, including a fix for
CVE-2022-43995, a non-exploitable potential out-of-bounds write on
systems that do not use PAM, AIX authentication or BSD authentication.

PR:		267617
Approved by:	garga (Maintainer)
MFH:		2022Q4
Security:	CVE-2022-43995
1.9.12
24 Oct 2022 15:30:05
commit hash:8885a02766c06861e00d35aa819fa517321160becommit hash:8885a02766c06861e00d35aa819fa517321160becommit hash:8885a02766c06861e00d35aa819fa517321160becommit hash:8885a02766c06861e00d35aa819fa517321160be files touched by this commit This port version is marked as vulnerable.
Renato Botelho (garga) search for other commits by this committer
security/sudo: Update to 1.9.12

Sponsored by:	Rubicon Communications, LLC ("Netgate")
07 Sep 2022 21:58:51
commit hash:fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash:fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash:fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash:fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 files touched by this commit
Stefan Eßer (se) search for other commits by this committer
Remove WWW entries moved into port Makefiles

Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.

This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.

Approved by:		portmgr (tcberner)
1.9.11p3
07 Sep 2022 21:10:59
commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52 files touched by this commit This port version is marked as vulnerable.
Stefan Eßer (se) search for other commits by this committer
Add WWW entries to port Makefiles

It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.9.11p3
20 Jul 2022 14:22:56
commit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fecommit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fecommit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fecommit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fe files touched by this commit This port version is marked as vulnerable.
Tobias C. Berner (tcberner) search for other commits by this committer
security: remove 'Created by' lines

A big Thank You to the original contributors of these ports:

  *  <ports@c0decafe.net>
  *  Aaron Dalton <aaron@FreeBSD.org>
  *  Adam Weinberger <adamw@FreeBSD.org>
  *  Ade Lovett <ade@FreeBSD.org>
  *  Aldis Berjoza <aldis@bsdroot.lv>
  *  Alex Dupre <ale@FreeBSD.org>
  *  Alex Kapranoff <kappa@rambler-co.ru>
  *  Alex Samorukov <samm@freebsd.org>
  *  Alexander Botero-Lowry <alex@foxybanana.com>
  *  Alexander Kriventsov <avk@vl.ru>
  *  Alexander Leidinger <netchild@FreeBSD.org>
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.9.11p3
21 Jun 2022 17:56:59
commit hash:c6a7564417b0fccb7a243921d4646983adf66a5fcommit hash:c6a7564417b0fccb7a243921d4646983adf66a5fcommit hash:c6a7564417b0fccb7a243921d4646983adf66a5fcommit hash:c6a7564417b0fccb7a243921d4646983adf66a5f files touched by this commit This port version is marked as vulnerable.
Renato Botelho (garga) search for other commits by this committer
security/sudo: Update to 1.9.11p3

Sponsored by:	Rubicon Communications, LLC ("Netgate")
1.9.11p2
13 Jun 2022 14:05:57
commit hash:7c653e8c86389002306179a31568c64090f89b56commit hash:7c653e8c86389002306179a31568c64090f89b56commit hash:7c653e8c86389002306179a31568c64090f89b56commit hash:7c653e8c86389002306179a31568c64090f89b56 files touched by this commit This port version is marked as vulnerable.
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.11p2 -- Fix regressions

Major changes between sudo 1.9.11p2 and 1.9.11p1:

 * Fixed a compilation error on Linux/x86_64 with the x32 ABI.

 * Fixed a regression introduced in 1.9.11p1 that caused a warning
   when logging to sudo_logsrvd if the command returned no output.

PR:		264643
Approved by:	garga (maintainer)
1.9.11p1
09 Jun 2022 20:41:24
commit hash:7e42695954c2c1fe0ecdc9ff98323d1a6e9a53f0commit hash:7e42695954c2c1fe0ecdc9ff98323d1a6e9a53f0commit hash:7e42695954c2c1fe0ecdc9ff98323d1a6e9a53f0commit hash:7e42695954c2c1fe0ecdc9ff98323d1a6e9a53f0 files touched by this commit This port version is marked as vulnerable.
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.11p1

Major changes between sudo 1.9.11p1 and 1.9.11:

 * Correctly handle EAGAIN in the I/O read/right events.  This fixes
   a hang seen on some systems when piping a large amount of data
   through sudo, such as via rsync.  Bug #963.

 * Changes to avoid implementation or unspecified behavior when
   bit shifting signed values in the protobuf library.

 * Fixed a compilation error on Linux/aarch64.

 * Fixed the configure check for seccomp(2) support on Linux.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.9.11
08 Jun 2022 19:30:42
commit hash:39c8b4fa2e8fc9df650ab9863761c637898a0bbbcommit hash:39c8b4fa2e8fc9df650ab9863761c637898a0bbbcommit hash:39c8b4fa2e8fc9df650ab9863761c637898a0bbbcommit hash:39c8b4fa2e8fc9df650ab9863761c637898a0bbb files touched by this commit This port version is marked as vulnerable.
Dima Panov (fluffy) search for other commits by this committer
security/sudo: fix packaging with PYTHON option enabled (+)

This a followup to commit 3ee710e0b22309a7e87c71b87bf5510aa8678ed8

sudo-1.9.11 have moved plugins manpages from section 8 to section 5

Pointy hat to:	cy
Approved by:	portmgr blanket
1.9.11
08 Jun 2022 13:51:10
commit hash:3ee710e0b22309a7e87c71b87bf5510aa8678ed8commit hash:3ee710e0b22309a7e87c71b87bf5510aa8678ed8commit hash:3ee710e0b22309a7e87c71b87bf5510aa8678ed8commit hash:3ee710e0b22309a7e87c71b87bf5510aa8678ed8 files touched by this commit This port version is marked as vulnerable.
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.11

Major changes between sudo 1.9.11 and 1.9.10:

 * Fixed a crash in the Python module with Python 3.9.10 on some
   systems.  Additionally, "make check" now passes for Python 3.9.10.

 * Error messages sent via email now include more details, including
   the file name and the line number and column of the error.
   Multiple errors are sent in a single message.  Previously, only
   the first error was included.

 * Fixed logging of parse errors in JSON format.  Previously,
   the JSON logger would not write entries unless the command and
   runuser were set.  These may not be known at the time a parse
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.9.10
04 Mar 2022 15:04:25
commit hash:c003f33dda3c873c738c9095c6881ae272d32f2ccommit hash:c003f33dda3c873c738c9095c6881ae272d32f2ccommit hash:c003f33dda3c873c738c9095c6881ae272d32f2ccommit hash:c003f33dda3c873c738c9095c6881ae272d32f2c files touched by this commit This port version is marked as vulnerable.
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.10

PR:		262331
Approved by:	garga (maintainer)
1.9.9
02 Feb 2022 11:04:53
commit hash:af389a6c018ae76f32af18a87031e63c17e300e7commit hash:af389a6c018ae76f32af18a87031e63c17e300e7commit hash:af389a6c018ae76f32af18a87031e63c17e300e7commit hash:af389a6c018ae76f32af18a87031e63c17e300e7 files touched by this commit This port version is marked as vulnerable.
Renato Botelho (garga) search for other commits by this committer
Author: Yasuhiro Kimura
security/sudo: Update to 1.9.9

PR:		261529
Sponsored by:	Rubicon Communications, LLC ("Netgate")
1.9.8p2
30 Sep 2021 13:51:29
commit hash:3c5b4dac33fa23d0cb8464556adfcf8a5d097c5bcommit hash:3c5b4dac33fa23d0cb8464556adfcf8a5d097c5bcommit hash:3c5b4dac33fa23d0cb8464556adfcf8a5d097c5bcommit hash:3c5b4dac33fa23d0cb8464556adfcf8a5d097c5b files touched by this commit This port version is marked as vulnerable.
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.8p2

Major changes between sudo 1.9.8p2 and 1.9.8p1:

 * Fixed a potential out-of-bounds read with "sudo -i" when the
   target user's shell is bash.  This is a regression introduced
   in sudo 1.9.8.  Bug #998.

 * sudo_logsrvd now only sends a log ID for first command of a session.
   There is no need to send the log ID for each sub-command.

 * Fixed a few minor memory leaks in intercept mode.

 * Fixed a problem with sudo_logsrvd in relay mode if "store_first"
   was enabled when handling sub-commands.  A new zero-length journal
   file was created for each sub-command instead of simply using
   the existing journal file.

PR:		258666
Submitted by:	cy
Reported by:	cy
Approved by:	garga (maintainer)
MFH:		2021Q3
1.9.8p1
17 Sep 2021 15:33:01
commit hash:549e87a5edcd9b96360d74b58dbfc04749bd0580commit hash:549e87a5edcd9b96360d74b58dbfc04749bd0580commit hash:549e87a5edcd9b96360d74b58dbfc04749bd0580commit hash:549e87a5edcd9b96360d74b58dbfc04749bd0580 files touched by this commit This port version is marked as vulnerable.
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.8p1 to fix LDAP SEGFAULT

Sudo version 1.9.8 patchelevel 1 is now available which fixes a few
regressions introduced in sudo 1.9.8.

Source:
    https://www.sudo.ws/dist/sudo-1.9.8p1.tar.gz
    ftp://ftp.sudo.ws/pub/sudo/sudo-1.9.8p1.tar.gz

SHA256 checksum:
    0939ee24df7095a92e0ca4aa3bd53b2a10965a7b921d51a26ab70cdd24388d69
MD5 checksum:
    ae9c8b32268f27d05bcdcb8f0c04d461

Binary packages:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.9.8
14 Sep 2021 16:50:22
commit hash:c403b7871cf09f123de4151bb77e8438f342075ecommit hash:c403b7871cf09f123de4151bb77e8438f342075ecommit hash:c403b7871cf09f123de4151bb77e8438f342075ecommit hash:c403b7871cf09f123de4151bb77e8438f342075e files touched by this commit This port version is marked as vulnerable.
Cy Schubert (cy) search for other commits by this committer
securty/sudo: Update to 1.9.8

Major changes between sudo 1.9.8 and 1.9.7p2:

 * It is now possible to transparently intercepting sub-commands
   executed by the original command run via sudo.  Intercept support
   is implemented using LD_PRELOAD (or the equivalent supported by
   the system) and so has some limitations.  The two main limitations
   are that only dynamic executables are supported and only the
   execl, execle, execlp, execv, execve, execvp, and execvpe library
   functions are currently intercepted. Its main use case is to
   support restricting privileged shells run via sudo.

   To support this, there is a new "intercept" Defaults setting and
   an INTERCEPT command tag that can be used in sudoers.  For example:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.9.7p2
13 Aug 2021 13:10:44
commit hash:6aeff2e8d145527738a0fc5cec87c9e2e122ef81commit hash:6aeff2e8d145527738a0fc5cec87c9e2e122ef81commit hash:6aeff2e8d145527738a0fc5cec87c9e2e122ef81commit hash:6aeff2e8d145527738a0fc5cec87c9e2e122ef81 files touched by this commit This port version is marked as vulnerable.
Renato Botelho (garga) search for other commits by this committer
Author: Yasuhiro Kimura
security/sudo: Update to 1.9.7p2

Sponsored by:	Rubicon Communications, LLC ("Netgate")
1.9.7p1
14 Jun 2021 16:04:01
commit hash:f34318c566935213a6e7c4e2ac53a6b921a6e9f9commit hash:f34318c566935213a6e7c4e2ac53a6b921a6e9f9commit hash:f34318c566935213a6e7c4e2ac53a6b921a6e9f9commit hash:f34318c566935213a6e7c4e2ac53a6b921a6e9f9 files touched by this commit This port version is marked as vulnerable.
Cy Schubert (cy) search for other commits by this committer
securty/sudo: Update to 1.9.7p1

Major changes between sudo 1.9.7p1 and 1.9.7

 * Fixed an SELinux sudoedit bug when the edited temporary file
   could not be opened.  The sesh helper would still be run even
   when there are no temporary files available to install.

 * Fixed a compilation problem on FreeBSD.

 * The sudo_noexec.so file is now built as a module on all systems
   other than macOS.  This makes it possible to use other libtool
   implementations such as slibtool.  On macOS shared libraries and
   modules are not interchangeable and the version of libtool shipped
   with sudo must be used.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.9.7
18 May 2021 20:07:09
commit hash:72d1eb161b86e663242d192171078d6babc1afdfcommit hash:72d1eb161b86e663242d192171078d6babc1afdfcommit hash:72d1eb161b86e663242d192171078d6babc1afdfcommit hash:72d1eb161b86e663242d192171078d6babc1afdf files touched by this commit This port version is marked as vulnerable.
Cy Schubert (cy) search for other commits by this committer
security/sudo: update to 1.9.7

Among other changes this release fixes -fcommon errors. A complete list
of changes can be found at https://www.sudo.ws/stable.html/

PR:		255812
Submitted by:	Yasuhiro Kimura <yasu@utahime.org> (mostly)
Reported by:	Yasuhiro Kimura <yasu@utahime.org>
Tested by:	cy
Approved by:	garga (maintainer)
MFH:		2021Q2
1.9.6p1
06 Apr 2021 14:31:13
commit hash:135fdeebb99c3569e42d8162b265e15d29bd937dcommit hash:135fdeebb99c3569e42d8162b265e15d29bd937dcommit hash:135fdeebb99c3569e42d8162b265e15d29bd937dcommit hash:135fdeebb99c3569e42d8162b265e15d29bd937d files touched by this commit This port version is marked as vulnerable.
Mathieu Arnold (mat) search for other commits by this committer
all: Remove all other $FreeBSD keywords.
1.9.6p1
06 Apr 2021 14:31:07
commit hash:305f148f482daf30dcf728039d03d019f88344ebcommit hash:305f148f482daf30dcf728039d03d019f88344ebcommit hash:305f148f482daf30dcf728039d03d019f88344ebcommit hash:305f148f482daf30dcf728039d03d019f88344eb files touched by this commit This port version is marked as vulnerable.
Mathieu Arnold (mat) search for other commits by this committer
Remove # $FreeBSD$ from Makefiles.
1.9.6p1
17 Mar 2021 11:56:41
Revision:568647Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.6p1

PR:		254260
Submitted by:	Yasuhiro Kimura <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC ("Netgate")
1.9.5p2
26 Jan 2021 20:15:31
Revision:562997Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
security/sudo - update 1.9.5p1 to 1.9.5p2

	(text/plain)
Sudo version 1.9.5p2 is now available which fixes CVE-2021-3156
(aka Baron Samedit), a severe security vulnerability in sudo versions
1.8.2 through 1.9.5p1.  For more details, see:
    https://www.sudo.ws/alerts/unescape_overflow.html
    https://www.openwall.com/lists/oss-security/2021/01/26/3

Source:
    https://www.sudo.ws/dist/sudo-1.9.5p2.tar.gz
    ftp://ftp.sudo.ws/pub/sudo/sudo-1.9.5p2.tar.gz
    SHA256 539e2ef43c8a55026697fb0474ab6a925a11206b5aa58710cb42a0e1c81f0978
    MD5 e6bc4c18c06346e6b3431637a2b5f3d5
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.9.5p1
12 Jan 2021 12:40:23
Revision:561323Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.5p1

This version fixes a regression introduced by 1.9.5

Changelog: https://www.sudo.ws/stable.html#1.9.5p1

PR:		252598
Submitted by:	cy
MFH:		2021Q1
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.9.5
11 Jan 2021 20:06:29
Revision:561259Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.9.4p2 --> 1.9.5

PR:		252583
Submitted by:	cy
Reported by:	cy
Approved by:	garga (maintainer)
MFH:		2021Q1
Security:	CVE-2021-23239
1.9.4p2
21 Dec 2020 16:54:42
Revision:558844Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Fix version

Use PORTVERSION here to end up with 1.9.4p2, which is considered newer than
previous one (1.9.4_1)

Reported by:	ohauer <ohauer@gmx.de>
1.9.4.p2
21 Dec 2020 12:44:16
Revision:558816Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.4p2

PR:		251930
Submitted by:	Yasuhiro Kimura <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.9.4_1
07 Dec 2020 12:43:25
Revision:557225Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Fix build without sendmail

PR:		251582
Reported by:	Alexander Kuznetsov <alex@kuznetcoff.ru>
Obtained from:	https://www.sudo.ws/repos/sudo/raw-rev/41db1aad85bb
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.9.4
04 Dec 2020 12:32:14
Revision:556978Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.4

PR:		251488
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.9.3p1
18 Nov 2020 12:22:20
Revision:555641Original commit files touched by this commit This port version is marked as vulnerable.
rene search for other commits by this committer
security/sudo: readd option for SSSD, reverting r553505
1.9.3p1
27 Oct 2020 22:17:10
Revision:553505Original commit files touched by this commit This port version is marked as vulnerable.
rene search for other commits by this committer
security/sudo: remove optional expired dependency on security/sssd
1.9.3p1
24 Sep 2020 18:53:54
Revision:549938Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.3p1

PR:		249566
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.9.3
22 Sep 2020 13:25:17
Revision:549590Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.3

PR:		249511
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.9.2
22 Jul 2020 17:17:21
Revision:542878Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.9.1 --> 1.9.2

Major changes between sudo 1.9.2 and 1.9.1

 * The configure script now uses pkg-config to find the openssl
   cflags and libs where possible.

 * The contents of the log.json I/O log file is now documented in
   the sudoers manual.

 * The sudoers plugin now properly exports the sudoers_audit symbol
   on systems where the compiler lacks symbol visibility controls.
   This caused a regression in 1.9.1 where a successful sudo command
   was not logged due to the missing audit plugin.  Bug #931.

 * Fixed a regression introduced in 1.9.1 that can result in crash
   when there is a syntax error in the sudoers file.  Bug #934.

PR:		248179
Submitted by:	cy
Reported by:	cy
Approved by:	garga
Obtained from:	sudo-announce mailing list
MFH:		2020Q3 (because of regression fix)
1.9.1
19 Jun 2020 14:22:34
Revision:539616Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.9.1

* Add new option PYTHON that enables python plugin support

PR:		246472
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.31p1
28 Mar 2020 09:32:15
Revision:529324Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Update WWW

Approved by:	portmgr blanket
1.8.31p1
18 Mar 2020 14:01:53
Revision:528649Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.31p1

Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.31
31 Jan 2020 13:59:20
Revision:524707Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
security/sudo update 1.8.30 --> 1.8.31

PR:		243745
Submitted by:	cy@
Reported by:	cy@
Approved by:	garga@
MFH:		2020Q1
Security:	 CVE-2019-18634
1.8.30
02 Jan 2020 18:18:39
Revision:521863Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.29 --> 1.8.30

PR:		243009
Submitted by:	cy
Approved by:	garga (maintainer)
MFH:		2020Q1
1.8.29
29 Oct 2019 18:42:28
Revision:516027Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.29

Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.28p1
16 Oct 2019 18:52:21
Revision:514608Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Fix wrong version added in r514607 using PORTVERSION

Reported by:	Herbert J. Skuhra <herbert@gojira.at>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.28.p1
16 Oct 2019 18:37:52
Revision:514607Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.28p1

MFH:		2019Q4
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.28
14 Oct 2019 16:46:28
Revision:514465Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.28

Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.27_1
22 Jan 2019 13:51:16
Revision:490951Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Fix listpw=never

When listpw=never is set, 'sudo -l' is expected to run without asking for a
password.

PR:		234756
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://bugzilla.sudo.ws/show_bug.cgi?id=869
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.27
14 Jan 2019 12:52:00
Revision:490251Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.26 --> 1.8.27

Notable changes:

 * Fixes and clarifications to the sudo plugin documentation.

 * The sudo manuals no longer require extensive post-processing to
   hide system-specific features.  Conditionals in the roff source
   are now used instead.  This fixes corruption of the sudo manual
   on systems without BSD login classes.  Bug #861.

 * If an I/O logging plugin is configured but the plugin does not
   actually log any I/O, sudo will no longer force the command to
   be run in a pseudo-tty.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.8.26
14 Nov 2018 15:33:04
Revision:484929Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.26

PR:		233206 (based on)
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.25p1
13 Sep 2018 16:49:51
Revision:479679Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.25p1

Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.25
04 Sep 2018 11:42:58
Revision:478950Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.25

Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.24
20 Aug 2018 14:23:53
Revision:477656Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
security/sudo: Update to 1.8.24

PR:		230739
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.23_2
03 May 2018 18:57:15
Revision:468974Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Add --rundir definition to CONFIGURE_ARGS to make sure configure script uses
/var/run/sudo. Without it, on a system that has /run directory, configure
will by default define rundir to /run/sudo

Reported by:	Walter Schwarzenfeld <w.schwarzenfeld@utanet.at>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.23_1
03 May 2018 12:36:26
Revision:468922Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Fix PLIST without LDAP

PR:		227926
Reported by:	O. Hartmann
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.23
02 May 2018 13:09:38
Revision:468828Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.23

PR:		227900
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.22_5
24 Apr 2018 16:52:49
Revision:468221Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Add a new version of the patch committed in r468197 that fixes a regression
introduced by that version.

PR:		223587
Submitted by:	Todd C. Miller <Todd.Miller@sudo.ws>
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://bugzilla.sudo.ws/show_bug.cgi?id=831
MFH:		2018Q2
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.22_4
24 Apr 2018 11:07:12
Revision:468197Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Add a patch to fix cryptographic digest in command specification for shell
scripts and other interpreted files. Error happens because fexecve() requires
/dev/fd to be mounted. This patch detects if /dev/fd/N exists before attempt
to use fexecve and workaround the issue.

PR:		223587
Submitted by:	Todd C. Miller <Todd.Miller@sudo.ws>
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://bugzilla.sudo.ws/show_bug.cgi?id=831
MFH:		2018Q2
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.22_3
23 Apr 2018 18:43:45
Revision:468130Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Last commit was supposed to be a local change for testing. Patch was not yet
ready for production. Reverting it for now.
1.8.22_2
23 Apr 2018 18:40:50
Revision:468129Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Add a patch to fix cryptographic digest in command specification for shell
scripts and other interpreted files. Error happens because fexecve() requires
/dev/fd to be mounted. This patch detects if /dev/fd/N exists before attempt
to use fexecve and workaround the issue.

PR:		223587
Submitted by:	Todd C. Miller <Todd.Miller@sudo.ws>
Reported by:	vas@mpeks.tomsk.su
Obtained from:	https://www.sudo.ws/repos/sudo/rev/30f7c5d64104
MFH:		2018Q2
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.22_1
19 Apr 2018 13:11:34
Revision:467768Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Add new options to security/sudo to make it possible to build it with
  kerberos support.
- Bump PORTREVISION

PR:		225498
Submitted by:	Cullum Smith <cullum@c0ffee.net>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.22
19 Apr 2018 13:09:58
Revision:467767Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Add an example of prompt that shows which user password is being expected.
It's useful when targetpw option is set to avoid confusion. PORTREVISION was
not bumped because a new commit is going to happen soon with one more change
and it will bump it.

PR:		221264
Submitted by:	Rebecca Cran <rebecca@bluestop.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.22
17 Jan 2018 15:07:51
Revision:459262Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.22

Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.21p2_1
13 Nov 2017 16:58:14
Revision:454126Original commit files touched by this commit This port version is marked as vulnerable.
brd search for other commits by this committer
Pull in an upstream patch for security/sudo to not coredump if the hostname is
not set.

PR:		222510
Approved by:	garga
1.8.21p2
18 Sep 2017 16:47:41
Revision:450054Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.21p2

PR:		222194
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.21p1
05 Sep 2017 17:15:29
Revision:449304Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.21p1
1.8.21
29 Aug 2017 10:30:33
Revision:448901Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Update security/sudo to 1.8.21

PR:		221874
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
		bdrewery (SIGINFO fix)
Sponsored by:	Rubicon Communications, LLC (Netgate)
1.8.20p2_3
11 Aug 2017 18:32:58
Revision:447784Original commit files touched by this commit This port version is marked as vulnerable.
bdrewery search for other commits by this committer
- Fix sudo sending a 2nd SIGINFO on ^T to processes, which is already
  handled by the kernel sending it to the entire controlling terminal's
  process group.
  - This fixes ^T with 'sudo poudriere ...' showing a status log twice.
  - This is intended to be upstreamed.

Approved by:	garga (maintainer)
Tested by:	swills, bdrewery
Reviewed/Discussed with:	kib
Reported by:	kwm, swills, bapt, dim, kib, many others
MFH:		2017Q3
1.8.20p2_2
27 Jun 2017 13:49:53
Revision:444464Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Fix the way ${PREFIX}/etc/sudoers.d is handled removing the workaround added in
r260609 and using @dir

PR:		220234
Submitted by:	Jose Luis Duran <jlduran@gmail.com>
Sponsored by:	Rubicon Communications (Netgate)
1.8.20p2_1
15 Jun 2017 11:01:34
Revision:443616Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Starting in 1.8.20, the sample sudoers file has been installed twice,
once as sudoers.sample and once as sudoers.dist. Remove one of them.

PR:		219708
Submitted by:	mat
Approved by:	maintainer timeout
Sponsored by:	Absolight
1.8.20p2
10 Jun 2017 14:10:26
Revision:443091Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.20p2

Sponsored by:	Rubicon Communications (Netgate)
1.8.20p1
31 May 2017 12:42:02
Revision:442153Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.20 --> 1.8.20p1

This release fixes a potential security issue that may allow a user to
bypass the "tty_ticket" constraints or overwrite an arbitrary file.
The issue is reported to only be present on Linux systems but I don't
think it hurts to update the FreeBSD port at this time.

Approved by:		garga@ (maintainer)
MFH:			2017Q2
Differential Revision:	D10997
1.8.20
11 May 2017 17:03:08
Revision:440636Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.20

Sponsored by:	Rubicon Communications (Netgate)
1.8.19p2
16 Jan 2017 13:38:38
Revision:431645Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.19p1 --> 1.8.19p2.

Major changes between sudo 1.8.19p2 and 1.8.19p1:

 * Fixed a crash in visudo introduced in sudo 1.8.9 when an IP address
   or network is used in a host-based Defaults entry.  Bug #766

 * Added a missing check for the ignore_iolog_errors flag when
   the sudoers plugin generates the I/O log file path name.

 * Fixed a typo in sudo's vsyslog() replacement that resulted in
   garbage being logged to syslog.

Approved by:	garga (maintainer)
MFH:		2917Q1
Differential Revision:	D9181
1.8.19p1
20 Dec 2016 21:11:07
Revision:429031Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.19 --> 1.8.19p1

As per sudo announcement:

 * Fixed a bug introduced in sudo 1.8.19 that resulted in the wrong
   syslog priority and facility being used.

PR:		215447
Submitted by:	myself (in pr 215447)
Approved by:	garga (maintainer)
1.8.19
19 Dec 2016 23:59:23
Revision:428967Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.18p1 --> 1.8.19.

PR:		215434
Submitted by:	cy
Reviewed by:	garga (maintainer)
1.8.18p1
28 Oct 2016 12:16:32
Revision:424829Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.18 --> 1.8.18p1

From the sudo announcment:

Depending on your sudoers file configuration, the bug fixed in
1.8.18p1 may have a security impact.  For more information, see
https://www.sudo.ws/alerts/noexec_wordexp.html

Approved by:		garga@ (maintainer)
MFH:			2016Q4
Differential Revision:	D8363
1.8.18
21 Sep 2016 13:45:45
Revision:422559Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.18

Sponsored by:	Rubicon Communications (Netgate)
1.8.17p1
23 Jun 2016 00:55:19
Revision:417338Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update security/sudo to 1.8.17p1

MFH:		2016Q2
Sponsored by:	Rubicon Communications (Netgate)
1.8.17
20 Jun 2016 14:03:04
Revision:417158Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 1.8.16 --> 1.8.17

PR:		210407
Submitted by:	cy@
Approved by:	garga@
MFH:		2016Q2
1.8.16_2
11 Jun 2016 20:39:39
Revision:416751Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Add a patch to fix sudo bug #743 that causes a bug where it dereference
a NULL pointer when it looks up a negative cached entry which is stored
as a NULL passwd or group struct pointer

PR:		208198
Submitted by:	Fredrik Eriksson <fredrik.eriksson@loopia.se>
Obtained from:	https://www.sudo.ws/repos/sudo/rev/1d13341d53ec
Sponsored by:	Rubicon Communications (Netgate)
1.8.16_1
11 Jun 2016 20:11:14
Revision:416749Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Stop forcing -lssp_nonshared since libc already include it in every link.
  It should fix build when world is built with WITHOUT_SSP
- Bump PORTREVISION

PR:		203380
Submitted by:	Kenneth Salerno <kennethsalerno@yahoo.com>
Sponsored by:	Rubicon Communications (Netgate)
1.8.16
01 Apr 2016 14:25:18
Revision:412349Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
1.8.16
18 Mar 2016 12:15:26
Revision:411346Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Update security/sudo to 1.8.16 [1]
- Pet portlint using (pre|post)[un]exec items in plist

PR:		208111 [1]
Submitted by:	cy [1]
Sponsored by:	Rubicon Communications (Netgate)
1.8.15
03 Nov 2015 09:44:23
Revision:400688Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Update security/sudo to 1.8.15
- Remove patch-plugins__sudoers__Makefile.in, unnecessary on stagedir days
- Remove patch-plugins__sudoers__audit.c, sudo_gettext.h is already included
  by sudoers.h
- Rework patch-plugins__sudoers__sudoers.in to replace pkg_* utilities by
  pkg on message
1.8.14p3
22 Jul 2015 13:34:16
Revision:392680Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.14p3
1.8.14p2
21 Jul 2015 12:28:18
Revision:392625Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.14p2
1.8.14p1_1
20 Jul 2015 13:13:01
Revision:392568Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Fix installation with DOCS broken by my last commit
- Bump PORTREVISION

Pointyhat to:	garga
1.8.14p1
20 Jul 2015 12:30:55
Revision:392564Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
- Replace DISTVERSION by PORTVERSION otherwise it ends up as 1.8.14.p1,
  what is < 1.8.14. [1]
- While I'm here silence portlint warnings re-generating patches with
  make makepatch and removing unnecessary DOCS check

Reported by:	Robert Burmeister [1]
1.8.14.p1
19 Jul 2015 13:02:39
Revision:392505Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.14p1
1.8.14
17 Jul 2015 13:15:18
Revision:392376Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.14
1.8.13
14 May 2015 10:15:09
Revision:386312Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
1.8.13
15 Apr 2015 10:00:32
Revision:384041Original commit files touched by this commit This port version is marked as vulnerable.
robak search for other commits by this committer
security/sudo: add CPE info

PR:		199367
Submitted by:	Shun <shun.fbsd.pr@dropcut.net>
Approved by:	portmgr blanket
1.8.13
23 Mar 2015 11:39:49
Revision:381987Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.13
1.8.12
10 Feb 2015 15:58:44
Revision:378779Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Update to 1.8.12
1.8.11.p1
29 Dec 2014 03:39:52
Revision:375769Original commit files touched by this commit This port version is marked as vulnerable.
wxs search for other commits by this committer
Over to garga@.

I don't have the cycles to handle these higher profile ports anymore.
1.8.11.p1
16 Oct 2014 02:05:18
Revision:370967Original commit files touched by this commit This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.8.11p1

PR:		194259
Submitted by:	cy@ and Yasuhiro KIMURA <yasu@utahime.org>
1.8.10.p3_1
22 Sep 2014 15:38:19
Revision:368965Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Simplify plist
1.8.10.p3_1
11 Sep 2014 23:17:13
Revision:367995Original commit files touched by this commit This port version is marked as vulnerable.
bdrewery search for other commits by this committer
Use @sample for sudoers
1.8.10.p3_1
24 Jul 2014 18:34:16
Revision:362835Original commit files touched by this commit This port version is marked as vulnerable.
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.8.10.p3
15 Jul 2014 16:57:39
Revision:361977Original commit files touched by this commit This port version is marked as vulnerable.
adamw search for other commits by this committer
Add DOCS to OPTIONS_DEFINE to ports that check for PORT_OPTIONS:MDOCS.
1.8.10.p3
08 May 2014 03:27:07
Revision:353250Original commit files touched by this commit This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.8.10p3.
1.8.10.p2
12 Apr 2014 02:24:09
Revision:351059Original commit files touched by this commit This port version is marked as vulnerable.
wxs search for other commits by this committer
Add option for sssd.

Submitted by:	petef@
1.8.10.p2
17 Mar 2014 17:55:58
Revision:348496Original commit files touched by this commit This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.8.10p2.

PR:		ports/187567
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>

Number of commits found: 244 (showing only 100 on this page)

1 | 2 | 3  »