Skip to content

Commit d437883

Browse files
committed
Sudo 1.9.18
1 parent f260a27 commit d437883

File tree

3 files changed

+90
-10
lines changed

3 files changed

+90
-10
lines changed

NEWS

Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,83 @@
1+
What's new in Sudo 1.9.18
2+
3+
* Updated the embedded copy of protobuf-c to version 1.5.2
4+
and regenerated code from the .proto files.
5+
6+
* In intercept mode on Linux, the seccomp filter will now kill the
7+
process if the architecture does not match the native or compatible
8+
architectures.
9+
10+
* Fixed a problem in sudoreplay where a speed factor of 0 or less
11+
would result in a negative delay value that caused a hang during
12+
playback. Bug #1078.
13+
14+
* Restored the ability to run "sudo -u myname -g group" when the
15+
user portion of the Runas_Spec is non-empty and the specified
16+
group matches the Runas_Spec. Reported by Marc Schoolderman of
17+
the sudo-rs project.
18+
19+
* Fixed a bug with "sudo -U otheruser -l" where the NOPASSWD tag
20+
was being applied for commands other than "ALL" or "list". The
21+
NOPASSWD tag should only be applied when listing another user's
22+
privileges if the command is "ALL" or "list". Reported by Marc
23+
Schoolderman of the sudo-rs project.
24+
25+
* The "-fcf-protection=full" compiler option is now only used for
26+
x86_64 CPUs. For 32-bit x86 CPUs, "-fcf-protection=return" is
27+
used instead. This fixes an illegal instruction problem on some
28+
older Intel-compatible CPUs that do not implement the ENDBR32
29+
instruction.
30+
31+
* The sudo_sendlog man page is now only installed when sudo_sendlog
32+
itself is installed. GitHub issue #467
33+
34+
* Sudo now uses most of the suggested compiler and linker options
35+
from the OpenSSF Compiler Options Hardening Guide for C and C++.
36+
37+
* Fixed multiple potential crashes in sudo_logsrvd.
38+
Found by Joshua Rogers (https://joshua.hu) using the ZeroPath
39+
tool (https://zeropath.com/).
40+
41+
* Fixed a potential message corruption error in sudo_logsrvd.
42+
Found by Joshua Rogers (https://joshua.hu) using the ZeroPath
43+
tool (https://zeropath.com/).
44+
45+
* Fixed multiple resource leaks on error paths. Found by Joshua
46+
Rogers (https://joshua.hu) using the ZeroPath tool
47+
(https://zeropath.com/).
48+
49+
* Fixed a potential path traversal bug in sudo_logsrvd when
50+
restarting an existing log file. The log ID is used to
51+
construct the path to the log file and must not contain
52+
any ".." path components. Found by Joshua Rogers
53+
(https://joshua.hu) using the ZeroPath tool (https://zeropath.com/).
54+
55+
* Fixed a bug in sudo_sendlog that prevented it from transmitting
56+
older sudo I/O logs that lack a log.json file.
57+
58+
* sudo_sendlog now verifies the server certificate by default,
59+
as per the documentation.
60+
61+
* Fixed a bug that prevented the sending of exit events to the
62+
sudo log server when I/O logging is not enabled.
63+
64+
* Fixed a bug that caused sudo-style logs generated by sudo_logsrvd
65+
to be line-wrapped after 5 characters.
66+
67+
* When sudo_logsrvd verifies TLS client certificates, it now uses
68+
the IP address of the peer as well as the DNS hostname, if it
69+
can be resolved from the address. Previously, sudo_logsrvd would
70+
resolve DNS hostnames in the client's certificate to IP addresses
71+
and compare them to the client IP address.
72+
73+
* When sudo is logging to a remote log server (sudo_logsrvd),
74+
if the connection to the server is dropped, the socket is now
75+
closed immediately. This fixes an issue when restarting
76+
sudo_logsrvd on some systems.
77+
78+
* Fixed a bug that could result in sudo waiting 5 seconds after
79+
the command exits when logging events, but not I/O, to sudo_logsrvd.
80+
181
What's new in Sudo 1.9.17p2
282

383
* Fixed a bug introduced in sudo 1.9.16 that could result in sudo

configure

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
#! /bin/sh
22
# Guess values for system-dependent variables and create Makefiles.
3-
# Generated by GNU Autoconf 2.72 for sudo 1.9.17p2.
3+
# Generated by GNU Autoconf 2.72 for sudo 1.9.18.
44
#
55
# Report bugs to <https://bugzilla.sudo.ws/>.
66
#
@@ -614,8 +614,8 @@ MAKEFLAGS=
614614
# Identity of this package.
615615
PACKAGE_NAME='sudo'
616616
PACKAGE_TARNAME='sudo'
617-
PACKAGE_VERSION='1.9.17p2'
618-
PACKAGE_STRING='sudo 1.9.17p2'
617+
PACKAGE_VERSION='1.9.18'
618+
PACKAGE_STRING='sudo 1.9.18'
619619
PACKAGE_BUGREPORT='https://bugzilla.sudo.ws/'
620620
PACKAGE_URL=''
621621

@@ -1650,7 +1650,7 @@ if test "$ac_init_help" = "long"; then
16501650
# Omit some internal or obsolete options to make the list less imposing.
16511651
# This message is too long to be a string in the A/UX 3.1 sh.
16521652
cat <<_ACEOF
1653-
'configure' configures sudo 1.9.17p2 to adapt to many kinds of systems.
1653+
'configure' configures sudo 1.9.18 to adapt to many kinds of systems.
16541654

16551655
Usage: $0 [OPTION]... [VAR=VALUE]...
16561656

@@ -1716,7 +1716,7 @@ fi
17161716

17171717
if test -n "$ac_init_help"; then
17181718
case $ac_init_help in
1719-
short | recursive ) echo "Configuration of sudo 1.9.17p2:";;
1719+
short | recursive ) echo "Configuration of sudo 1.9.18:";;
17201720
esac
17211721
cat <<\_ACEOF
17221722

@@ -2011,7 +2011,7 @@ fi
20112011
test -n "$ac_init_help" && exit $ac_status
20122012
if $ac_init_version; then
20132013
cat <<\_ACEOF
2014-
sudo configure 1.9.17p2
2014+
sudo configure 1.9.18
20152015
generated by GNU Autoconf 2.72
20162016

20172017
Copyright (C) 2023 Free Software Foundation, Inc.
@@ -2831,7 +2831,7 @@ cat >config.log <<_ACEOF
28312831
This file contains any messages produced by compilers while
28322832
running configure, to aid debugging if configure makes a mistake.
28332833

2834-
It was created by sudo $as_me 1.9.17p2, which was
2834+
It was created by sudo $as_me 1.9.18, which was
28352835
generated by GNU Autoconf 2.72. Invocation command line was
28362836

28372837
$ $0$ac_configure_args_raw
@@ -38676,7 +38676,7 @@ cat >>$CONFIG_STATUS <<\_ACEOF || ac_write_fail=1
3867638676
# report actual input values of CONFIG_FILES etc. instead of their
3867738677
# values after options handling.
3867838678
ac_log="
38679-
This file was extended by sudo $as_me 1.9.17p2, which was
38679+
This file was extended by sudo $as_me 1.9.18, which was
3868038680
generated by GNU Autoconf 2.72. Invocation command line was
3868138681

3868238682
CONFIG_FILES = $CONFIG_FILES
@@ -38744,7 +38744,7 @@ ac_cs_config_escaped=`printf "%s\n" "$ac_cs_config" | sed "s/^ //; s/'/'\\\\\\\\
3874438744
cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
3874538745
ac_cs_config='$ac_cs_config_escaped'
3874638746
ac_cs_version="\\
38747-
sudo config.status 1.9.17p2
38747+
sudo config.status 1.9.18
3874838748
configured by $0, generated by GNU Autoconf 2.72,
3874938749
with options \\"\$ac_cs_config\\"
3875038750

configure.ac

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ dnl ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1818
dnl OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1919
dnl
2020
AC_PREREQ([2.69])
21-
AC_INIT([sudo], [1.9.17p2], [https://bugzilla.sudo.ws/], [sudo])
21+
AC_INIT([sudo], [1.9.18], [https://bugzilla.sudo.ws/], [sudo])
2222
AC_CONFIG_HEADERS([config.h pathnames.h])
2323
AC_CONFIG_SRCDIR([src/sudo.c])
2424
AC_CONFIG_AUX_DIR([scripts])

0 commit comments

Comments
 (0)