Date: Mon, 7 Apr 2003 13:39:09 +0400 (MSD) From: "Sergey A.Osokin" <osa@FreeBSD.org.ru> To: FreeBSD-gnats-submit@FreeBSD.org Cc: mharo@FreeBSD.org Subject: ports/50666: [PATCH] security/sudo: update from 1.6.6 to 1.6.7p3 Message-ID: <20030407093909.8CE3D5D@freebsd.org.ru> Resent-Message-ID: <200304070940.h379eCZU011399@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 50666 >Category: ports >Synopsis: [PATCH] security/sudo: update from 1.6.6 to 1.6.7p3 >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Mon Apr 07 02:40:11 PDT 2003 >Closed-Date: >Last-Modified: >Originator: Sergey A. Osokin >Release: FreeBSD 5.0-CURRENT i386 >Organization: n/a >Environment: System: FreeBSD 5.0-CURRENT #30: Mon Mar 31 15:10:23 MSD 2003 i386 >Description: security/sudo: update from 1.6.6 to 1.6.7p3 >How-To-Repeat: >Fix: Close ports/50566 Delete patch-aa % rm ports/securty/sudo/files/patch-aa % cvs rm ports/securty/sudo/files/patch-aa apply following patch Index: ports/security/sudo/Makefile =================================================================== RCS file: /home/ncvs/ports/security/sudo/Makefile,v retrieving revision 1.55 diff -u -r1.55 Makefile --- ports/security/sudo/Makefile 7 Mar 2003 06:10:50 -0000 1.55 +++ ports/security/sudo/Makefile 7 Apr 2003 09:29:07 -0000 @@ -6,14 +6,14 @@ # PORTNAME= sudo -PORTVERSION= 1.6.6 -PORTREVISION= 1 +PORTVERSION= 1.6.7.3 +PORTREVISION?= 0 CATEGORIES= security MASTER_SITES= http://www.sudo.ws/sudo/dist/ \ ftp://ftp.cs.colorado.edu/pub/sysadmin/sudo/ \ ftp://ftp.stikman.com/pub/sudo/ \ ftp://ftp.uu.net/pub/security/sudo/ -DISTNAME= ${PORTNAME}-1.6.6 +DISTNAME= ${PORTNAME}-1.6.7p3 MAINTAINER= mharo@FreeBSD.org COMMENT= Allow others to run commands as root Index: ports/security/sudo/distinfo =================================================================== RCS file: /home/ncvs/ports/security/sudo/distinfo,v retrieving revision 1.34 diff -u -r1.34 distinfo --- ports/security/sudo/distinfo 25 Apr 2002 17:20:23 -0000 1.34 +++ ports/security/sudo/distinfo 7 Apr 2003 09:29:07 -0000 @@ -1 +1 @@ -MD5 (sudo-1.6.6.tar.gz) = 4da4bf6cf31634cc7a17ec3b69fdc333 +MD5 (sudo-1.6.7p3.tar.gz) = b3ed2959489f73b81eb9e528d308dd38 Index: ports/security/sudo/files/patch-auth::pam.c =================================================================== RCS file: /home/ncvs/ports/security/sudo/files/patch-auth::pam.c,v retrieving revision 1.1 diff -u -r1.1 patch-auth::pam.c --- ports/security/sudo/files/patch-auth::pam.c 13 Feb 2003 08:26:38 -0000 1.1 +++ ports/security/sudo/files/patch-auth::pam.c 7 Apr 2003 09:29:07 -0000 @@ -1,47 +1,16 @@ -Index: auth/pam.c -=================================================================== -RCS file: /home/cvs/sudo/sudo/auth/pam.c,v -retrieving revision 1.30 -retrieving revision 1.31 -diff -u -r1.30 -r1.31 ---- auth/pam.c 22 Nov 2002 19:41:13 -0000 1.30 -+++ auth/pam.c 13 Dec 2002 16:33:26 -0000 1.31 -@@ -66,7 +66,7 @@ - #include "sudo_auth.h" - - #ifndef lint --static const char rcsid[] = "$Sudo: pam.c,v 1.29 2002/01/22 16:43:23 millert Exp $"; -+static const char rcsid[] = "$Sudo: pam.c,v 1.30 2002/11/22 19:41:13 millert Exp $"; - #endif /* lint */ - - static int sudo_conv __P((int, PAM_CONST struct pam_message **, -@@ -205,7 +205,7 @@ - PAM_CONST struct pam_message *pm; - const char *p = def_prompt; - char *pass; -- int n; -+ int n, flags; - extern int nil_pw; - - if ((*response = malloc(num_msg * sizeof(struct pam_response))) == NULL) -@@ -213,17 +213,17 @@ - (void) memset(*response, 0, num_msg * sizeof(struct pam_response)); - - for (pr = *response, pm = *msg, n = num_msg; n--; pr++, pm++) { -+ flags = tgetpass_flags; - switch (pm->msg_style) { - case PAM_PROMPT_ECHO_ON: -- tgetpass_flags |= TGP_ECHO; -+ flags |= TGP_ECHO; - case PAM_PROMPT_ECHO_OFF: - /* Only override PAM prompt if it matches /^Password: ?/ */ - if (strncmp(pm->msg, "Password:", 9) || (pm->msg[9] != '\0' - && (pm->msg[9] != ' ' || pm->msg[10] != '\0'))) +--- auth/pam.c.orig Wed Apr 2 11:55:50 2003 ++++ auth/pam.c Wed Apr 2 11:57:32 2003 +@@ -224,11 +224,11 @@ p = pm->msg; /* Read the password. */ -- pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60, -- tgetpass_flags); -+ pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60, flags); - pr->resp = estrdup(pass ? pass : ""); + pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60, flags); +- pr->resp = estrdup(pass ? pass : ""); ++ pr->resp = estrdup((const char *)pass ? (const char *)pass : ""); if (*pr->resp == '\0') nil_pw = 1; /* empty password */ + else +- memset(pass, 0, strlen(pass)); ++ memset((void *)pass, 0, strlen((const char *)pass)); + break; + case PAM_TEXT_INFO: + if (pm->msg) >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030407093909.8CE3D5D>