Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Jul 2023 14:21:48 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 272545] [PATCH] security/sudo: Update to 1.9.14p2
Message-ID:  <bug-272545-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272545

            Bug ID: 272545
           Summary: [PATCH] security/sudo: Update to 1.9.14p2
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: garga@FreeBSD.org
          Reporter: cy@FreeBSD.org
          Assignee: garga@FreeBSD.org
             Flags: maintainer-feedback?(garga@FreeBSD.org)

Sudo version 1.9.14p2 is now available, which fixes two bugs
introduced in the 1.9.14 release as well as a long-standing issue
with piped output when running commands in a pseudo-terminal.

Source:
    https://www.sudo.ws/dist/sudo-1.9.14p2.tar.gz
    ftp://ftp.sudo.ws/pub/sudo/sudo-1.9.14p2.tar.gz

SHA256 checksum:
    15f6308db0ed4265ec929f2c61e2e13492e551750c203ee001d1fcd8104c9514
MD5 checksum:
    dcb3e785029193407b3216156db74dad

Binary packages:
    https://www.sudo.ws/getting/packages/
    https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_14p2

For a list of download mirror sites, see:
    https://www.sudo.ws/getting/download_mirrors/

Sudo web site:
    https://www.sudo.ws/

Major changes between sudo 1.9.14p2 and 1.9.14p1:

 * Fixed a crash on Linux systems introduced in version 1.9.14 when
   running a command with a NULL argv[0] if "log_subcmds" or
   "intercept" is enabled in sudoers.

 * Fixed a problem with "stair-stepped" output when piping or
   redirecting the output of a sudo command that takes user input
   when running a command in a pseudo-terminal.

 * Fixed a bug introduced in sudo 1.9.14 that affects matching
   sudoers rules containing a Runas_Spec with an empty Runas user.
   These rules should only match when sudo's -g option is used but
   were matching even without the -g option.  GitHub issue #290.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-272545-7788>