Port details on branch 2021Q3 |
- sudo Allow others to run commands as root
- 1.9.8p2 security
=0 1.9.8p2Version of this port present on the latest quarterly branch. - Maintainer: garga@FreeBSD.org
 - Port Added: 2021-09-14 19:42:06
- Last Update: 2021-09-30 14:00:00
- Commit Hash: 1188e21
- License: sudo
- WWW:
- https://www.sudo.ws/
- Description:
- This is the CU version of sudo.
Sudo is a program designed to allow a sysadmin to give limited root
privileges to users and log root activity. The basic philosophy is to
give as few privileges as possible but still allow people to get their
work done.
WWW: https://www.sudo.ws/
¦ ¦ ¦ ¦ 
- Manual pages:
-
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- To install the port:
- cd /usr/ports/security/sudo/ && make install clean
- To add the package, run one of these commands:
- pkg install security/sudo
- pkg install sudo
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: sudo
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1632243869
SHA256 (sudo-1.9.8p2.tar.gz) = 9e3b8b8da7def43b6e60c257abe80467205670fd0f7c081de1423c414b680f2d
SIZE (sudo-1.9.8p2.tar.gz) = 4302256
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- msgfmt : devel/gettext-tools
- Library dependencies:
-
- libintl.so : devel/gettext-runtime
- This port is required by:
- for Run
-
- sysutils/cbsd
Configuration Options:
- ===> The following configuration options are available for sudo-1.9.8p2:
AUDIT=on: Enable BSM audit support
DISABLE_AUTH=off: Do not require authentication by default
DISABLE_ROOT_SUDO=off: Do not allow root to run sudo
DOCS=on: Build and/or install documentation
EXAMPLES=on: Build and/or install examples
INSULTS=off: Enable insults on failures
LDAP=off: LDAP protocol support
NLS=on: Native Language Support
NOARGS_SHELL=off: Run a shell if no arguments are given
OPIE=off: Enable one-time passwords (no PAM support)
PAM=on: Pluggable authentication module support
PYTHON=off: Enable python plugin support
SSSD=off: Enable SSSD backend support.
====> Enable Kerberos 5 authentication (no PAM support): you can only select none or one of them
GSSAPI_BASE=off: GSSAPI support via base system (needs Kerberos)
GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal
GSSAPI_MIT=off: GSSAPI support via security/krb5
===> Use 'make config' to modify these settings
- Options name:
- security_sudo
- USES:
- cpe libtool gettext
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Number of commits found: 4
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.9.8p2 30 Sep 2021 14:00:00
    |
Cy Schubert (cy)  |
security/sudo: Update to 1.9.8p2
Major changes between sudo 1.9.8p2 and 1.9.8p1:
* Fixed a potential out-of-bounds read with "sudo -i" when the
target user's shell is bash. This is a regression introduced
in sudo 1.9.8. Bug #998.
* sudo_logsrvd now only sends a log ID for first command of a session.
There is no need to send the log ID for each sub-command.
* Fixed a few minor memory leaks in intercept mode.
* Fixed a problem with sudo_logsrvd in relay mode if "store_first"
was enabled when handling sub-commands. A new zero-length journal
file was created for each sub-command instead of simply using
the existing journal file.
PR: 258666
Submitted by: cy
Reported by: cy
Approved by: garga (maintainer)
(cherry picked from commit 3c5b4dac33fa23d0cb8464556adfcf8a5d097c5b) |
1.9.8p1 30 Sep 2021 12:20:54
    |
Renato Botelho (garga)  Author: Cy Schubert |
security/sudo: Update to 1.9.8p1 to fix LDAP SEGFAULT
Sudo version 1.9.8 patchelevel 1 is now available which fixes a few
regressions introduced in sudo 1.9.8.
Source:
https://www.sudo.ws/dist/sudo-1.9.8p1.tar.gz
ftp://ftp.sudo.ws/pub/sudo/sudo-1.9.8p1.tar.gz
SHA256 checksum:
0939ee24df7095a92e0ca4aa3bd53b2a10965a7b921d51a26ab70cdd24388d69
MD5 checksum:
ae9c8b32268f27d05bcdcb8f0c04d461
Binary packages: (Only the first 15 lines of the commit message are shown above ) |
1.9.8 14 Sep 2021 19:39:20
    |
Cy Schubert (cy)  |
securty/sudo: Update to 1.9.8
Major changes between sudo 1.9.8 and 1.9.7p2:
* It is now possible to transparently intercepting sub-commands
executed by the original command run via sudo. Intercept support
is implemented using LD_PRELOAD (or the equivalent supported by
the system) and so has some limitations. The two main limitations
are that only dynamic executables are supported and only the
execl, execle, execlp, execv, execve, execvp, and execvpe library
functions are currently intercepted. Its main use case is to
support restricting privileged shells run via sudo.
To support this, there is a new "intercept" Defaults setting and
an INTERCEPT command tag that can be used in sudoers. For example: (Only the first 15 lines of the commit message are shown above ) |
1.9.7p2 14 Sep 2021 19:39:06
    |
Cy Schubert (cy)  Author: Yasuhiro Kimura |
security/sudo: Update to 1.9.7p2
Sponsored by: Rubicon Communications, LLC ("Netgate")
(cherry picked from commit 6aeff2e8d145527738a0fc5cec87c9e2e122ef81) |
Number of commits found: 4
|