Пакет sudo: Specfile

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
%define statusdir /var/run/control
%def_enable python
%def_with selinux
%def_with audit


Name: sudo
Version: 1.9.15p1
Release: alt1
Epoch: 1

Summary: Allows command execution as another user
License: ISC
Group: System/Base
Url: https://www.sudo.ws

# ftp://ftp.courtesan.com/pub/sudo/sudo-%version.tar.gz
Source: sudo-%version.tar

Source1: pam.conf
Source2: sudo.control
Source3: sudoers.control
Source4: sudoreplay.control
Source5: sudowheel.control
Source6: sudopw.config
Source7: sudopw.control

Patch: sudo-%version-alt.patch

PreReq: control
Requires: vitmp
Provides: %_sysconfdir/sudoers.d

# Automatically added by buildreq on Wed Apr 09 2003
BuildRequires: flex libpam-devel perl-podlators
# Due check of man pages type
BuildRequires: /usr/bin/nroff

BuildRequires: libcap-devel
%{?_with_selinux:BuildRequires: libselinux-devel}
%{?_with_audit:BuildRequires: libaudit-devel}

BuildRequires: python3-dev

%define _libexecdir %_prefix/libexec/sudo

Summary(ru_RU.UTF-8): Запускает команды в контексте другого пользователя

%description
Sudo is a program designed to allow a sysadmin to give limited root
privileges to users and log root activity.  The basic philosophy is
to give as few privileges as possible but still allow people to get
their work done.

%description -l ru_RU.UTF-8
Sudo - программа, разработанная в помощь системному администратору
делегировать те или иные привилегированные ресурсы пользователям,
с ведением протокола их деятельности.  Основная идея - делегировать
как можно меньше прав, но ровно столько, сколько необходимо для
решения поставленных задач.

%package logsrvd
Summary: High-performance log server for %name
Group: System/Servers
Requires: %name = %epoch:%version-%release

%description logsrvd
%name-logsrvd is a high-performance log server that accepts event and I/O logs from sudo.
It can be used to implement centralized logging of sudo logs.

%package python
Summary: Python plugin for %name
Group: Development/Python
Requires: %name = %epoch:%version-%release

%description python
The %name-python package contains sudo python policy plugin.

%package devel
Summary: Development files for %name
Group: Development/C
Requires: %name = %epoch:%version-%release
BuildArch: noarch

%description devel
The %name-devel package contains header files developing sudo
plugins that use %name.

%description devel -l ru_RU.UTF-8
Пакет %name-devel содержит заголовочные файлы для разработки расширений
для програмы %name.

%prep
%setup
%patch -p1

%build
./autogen.sh
export ac_cv_prog_NROFFPROG=nroff
configure_options='
--with-logging=syslog
--with-logfac=authpriv
--enable-shell-sets-home
--enable-log-host
--disable-rpath
--with-pam
--with-ignore-dot
--with-env-editor
--with-tty-tickets
--with-sudoers-mode=0400
--with-editor=/bin/vitmp
--with-sendmail=/usr/sbin/sendmail
--with-sssd
%{subst_with selinux}
%{?_with_audit:--with-linux-audit}
--disable-shared-libutil
--enable-static-sudoers
%{subst_enable python}
--docdir=%_datadir/doc/%name-%version
--with-plugindir=%_libdir/sudo
--libexecdir=%_libdir
--with-secure-path=/sbin:/usr/sbin:/usr/local/sbin:/bin:/usr/bin:/usr/local/bin'

%configure $configure_options --with-passprompt='[sudo] password for %%p:'
%make_build

%install
%makeinstall_std INSTALL_OWNER=
install -pD -m600 %SOURCE1 %buildroot%_sysconfdir/pam.d/sudo
mkdir -p %buildroot%_sysconfdir/sudoers.d
install -pD -m644 %SOURCE6 %buildroot%_sysconfdir/sudoers.d/99-sudopw
chmod u+rwx %buildroot%prefix/*bin/*
install -pD -m755 %SOURCE2 %buildroot%_controldir/sudo
install -pD -m755 %SOURCE3 %buildroot%_controldir/sudoers
install -pD -m755 %SOURCE4 %buildroot%_controldir/sudoreplay
install -pD -m755 %SOURCE5 %buildroot%_controldir/sudowheel
install -pD -m755 %SOURCE7 %buildroot%_controldir/sudopw
bzip2 -9 %buildroot%_datadir/doc/%name-%version/ChangeLog

%find_lang sudo
%find_lang sudoers

cat sudo.lang sudoers.lang > sudo_all.lang
rm sudo.lang sudoers.lang
rm -f %buildroot%_libdir/sudo/*.la %buildroot%_libdir/*.so

mv %buildroot%_sysconfdir/sudoers.dist %buildroot%_datadir/doc/%name-%version/

%pre
%pre_control sudo
%pre_control sudoers
if [ -f "%_controldir/sudoreplay" ]; then
    %pre_control sudoreplay
fi
if [ -f "%_controldir/sudowheel" ]; then
    %pre_control sudowheel
fi
if [ -f "%_controldir/sudopw" ]; then
    %pre_control sudopw
fi

%post
if [ -f %_sysconfdir/sudoers.d/99-sudopw.rpmnew ]; then
    mv -f %_sysconfdir/sudoers.d/99-sudopw.rpmnew %_sysconfdir/sudoers.d_99-sudopw.rpmnew
    echo "warning: created config %_sysconfdir/sudoers.d/99-sudopw.rpmnew"
    echo "         has been moved as %_sysconfdir/sudoers.d_99-sudopw.rpmnew"
fi
%post_control -s wheelonly sudo
%post_control -s strict sudoers
if [ ! -f "%statusdir/sudoreplay" ]; then
    %pre_control sudoreplay
fi
%post_control -s wheelonly sudoreplay
if [ ! -f "%statusdir/sudowheel" ]; then
    %pre_control sudowheel
fi
%post_control -s disabled sudowheel
if [ ! -f "%statusdir/sudopw" ]; then
    %pre_control sudopw
fi
%post_control -s default sudopw

%triggerpostun -- %name < 1:1.8.0
cp -a %_sysconfdir/sudoers %_sysconfdir/sudoers.rpmsave
if ! grep -q '^#includedir %_sysconfdir/sudoers.d$' %_sysconfdir/sudoers; then
    if [ -d %_sysconfdir/sudoers.d ]; then
        echo "WARNING: %_sysconfdir/sudoers.d directory no longer supported indirectly"
        echo "Update %_sysconfdir/sudoers with next line:"
        echo "#includedir %_sysconfdir/sudoers.d"
        echo

        echo >>%_sysconfdir/sudoers
        echo "# Automatically updates by rpm:" >>%_sysconfdir/sudoers
        echo "#includedir %_sysconfdir/sudoers.d" >>%_sysconfdir/sudoers
    fi
fi
if ! grep -q '^#includedir %_sysconfdir/sudo.d$' %_sysconfdir/sudoers; then
    if [ -d %_sysconfdir/sudo.d ]; then
        echo "WARNING: %_sysconfdir/sudo.d compat directory no longer supported indirectly"

        if [ "$(ls -A %_sysconfdir/sudo.d)" ]; then
            echo "Update %_sysconfdir/sudoers with next line:"
            echo "#includedir %_sysconfdir/sudo.d"

            echo >>%_sysconfdir/sudoers
            echo "# Automatically updates by rpm:" >>%_sysconfdir/sudoers
            echo "#includedir %_sysconfdir/sudo.d" >>%_sysconfdir/sudoers
        fi

        echo
    fi
fi

%files -f sudo_all.lang
%config %_controldir/sudo*
%config(noreplace) %_sysconfdir/sudoers.d/99-sudopw
%attr(600,root,root) %config(noreplace) %_sysconfdir/sudo.conf
%attr(400,root,root) %config(noreplace) %_sysconfdir/sudoers
%attr(600,root,root) %config(noreplace) %_sysconfdir/pam.d/sudo
%_bindir/sudoedit
%dir %_libdir/sudo
%if_with selinux
%_libdir/sudo/sesh
%endif
%_libdir/sudo/*.so*
%if_enabled python
%exclude %_libdir/sudo/python_plugin.so
%endif
%attr(700,root,root) %_bindir/sudo
%attr(700,root,root) %_bindir/sudoreplay
%attr(755,root,root) %_sbindir/visudo
%attr(700,root,root) %_sysconfdir/sudoers.d
%_bindir/cvtsudoers
%_mandir/man?/*
%exclude %_man5dir/sudo_plugin.5*
%if_enabled python
%exclude %_man5dir/sudo_plugin_python.5*
%endif
%exclude %_man5dir/sudo_logsrv.proto.5*
%exclude %_man5dir/sudo_logsrvd.conf.5*
%exclude %_man8dir/sudo_logsrvd.8*
%exclude %_man8dir/sudo_sendlog.8*
%_datadir/doc/%name-%version/

%files logsrvd
%attr(600,root,root) %config(noreplace) %_sysconfdir/sudo_logsrvd.conf
%_sbindir/sudo_logsrvd
%_sbindir/sudo_sendlog
%_man5dir/sudo_logsrv.proto.5*
%_man5dir/sudo_logsrvd.conf.5*
%_man8dir/sudo_logsrvd.8*
%_man8dir/sudo_sendlog.8*

%if_enabled python
%files python
%_libdir/sudo/python_plugin.so
%_man5dir/sudo_plugin_python.5*
%endif

%files devel
%doc plugins/sample/sample_plugin.c
%_includedir/sudo_plugin.h
%_man5dir/sudo_plugin.5*

%changelog
* Wed Nov 08 2023 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.15p1-alt1
- Update to latest stable bugfix and security release (fixes: CVE-2023-42465):
 + The sudoers plugin has been modified to make it more resilient to ROWHAMMER
   attacks on authentication and policy matching.
 + The sudoers plugin now constructs the user time stamp file path name using
   the user-ID instead of the user name. This avoids a potential problem with
   user names that contain a path separator ('/') being interpreted as part of
   the path name. A similar issue in sudo-rs has been assigned CVE-2023-42456.
- Fixes in behavior:
 + The visudo utility will no longer create an empty file when the specified
   sudoers file does not exist and the user exits the editor without making any
   changes (GitHub#294).
 + Fixed a bug where output could go to the wrong terminal if "use_pty" is
   enabled (the default) and the standard input, output or error is redirected
   to a different terminal. Bug #1056.
 + A path separator ('/') in a user, group or host name is now replaced with an
   underbar character ('_') when expanding escapes in @include and @includedir
   directives as well as the "iolog_file" and "iolog_dir" sudoers Default
   settings.
- Fixes in user output:
 + Running "sudo -ll command" now produces verbose output that includes matching
   rule as well as the path to the sudoers file the matching rule came from.
 + Changes to terminal settings are now performed atomically, where possible.
   If the command is being run in a pseudo-terminal and the user's terminal is
   already in raw mode, sudo will not change the user's terminal settings. This
   prevents concurrent sudo processes from restoring the terminal settings to
   the wrong values (GitHub#312).
 + Better log message when rejecting a command if the "intercept" option is
   enabled and the "intercept_allow_setid" option is disabled. Previously,
   "command not allowed" would be logged and the user had no way of knowing
   what the actual problem was.
- Fixes in logging:
 + The sudoers source is now logged in the JSON event log. This makes it
   possible to tell which rule resulted in a match.
 + Sudo will now log the invoking user's environment as "submitenv" in the JSON
   logs. The command's environment ("runenv") is no longer logged for commands
   rejected by the sudoers file or an approval plugin.
 + The sudo_logsrvd server will now raise its open file descriptor limit to the
   maximum allowed value when it starts up. Each connection can require up to
   nine open file descriptors so the default soft limit may be too low.
- Fixed regressions:
 + Fixed the warning message for "sudo -l command" when the command is not
   permitted. There was a missing space between "list" and the actual command
   due to changes in sudo 1.9.14.
 + The "intercept_verify" sudoers option is now only applied when the
   "intercept" option is set in sudoers. Previously, it was also applied when
   "log_subcmds" was enabled. Sudo 1.9.14 contained an incorrect fix for this.
 + Reverted a change from sudo 1.9.4 that resulted in PAM session modules being
   called with the environment of the command to be run instead of the
   environment of the invoking user (GitHub#318).

* Sat Sep 23 2023 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.14p3-alt1
- Update to latest stable release with regressions fixes.
- Fixed a bug introduced in sudo 1.9.14 that affects matching sudoers rules
  containing a Runas_Spec with an empty Runas user.
- Fixed a problem with "stair-stepped" output when piping or redirecting the
  output of a sudo command that takes user input.
- Fixed a crash introduced in version 1.9.14 when running a command with a NULL
  argv[0] if "log_subcmds" or "intercept" is enabled in sudoers.
- Adapted the sudo Python plugin test output to match Python 3.12.

* Fri Sep 22 2023 Ivan A. Melnikov <iv@altlinux.org> 1:1.9.14p1-alt2.1
- NMU: Add knobs for building w/o selinux and audit (thx asheplyakov@).

* Fri Jul 14 2023 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.14p1-alt2
- Disable build of shared libutil.
- Enable build with static sudoers.

* Thu Jul 13 2023 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.14p1-alt1
- Sudo now requires a C compiler that conforms to ISO C99 or higher to build.
- Fixed a bug where if the "intercept" or "log_subcmds" sudoers option was
  enabled and a sub-command was run where the first entry of the argument
  vector didn't match the command being run.
- The "intercept_verify" sudoers option is now only applied when the "intercept"
  option is set in sudoers. Previously, it was also applied when "log_subcmds"
  was enabled.
- The sudoers plugin now canonicalizes command path names before matchin.
- Improved command matching when a chroot is specified in sudoers.
- The visudo utility now displays a warning when it ignores a file in an
  include dir such as /etc/sudoers.d.
- When running a command in a pseudo-terminal, sudo will initialize the terminal
  settings even if it is the background process.
- Fixed a bug where only the first two digits of the TSID field being was logged.
- The "log_pty" sudoers option is now enabled by default. To restore the historic
  behavior where a command is run in the user's terminal, add "Defaults !use_pty"
  to the sudoers file.
- Sudo's "-b" option now works when the command is run in a pseudo-terminal.
- When disabling core dumps, sudo now only modifies the soft limit and leaves
  the hard limit as-is. This avoids problems on Linux when sudo does not have
  CAP_SYS_RESOURCE, which may be the case when run inside a container.
- Sudo configuration file paths have been converted to colon-separated lists of
  paths. This makes it possible to have configuration files on a read-only file
  system while still allowing for local modifications in a different (writable)
  directory.
- Fixed a long-standing bug where a sudoers rule without an explicit runas list
  allowed the user to run a command as root and any group instead of just one of
  the groups that root is a member of.
- Fixed a bug where a sudoers rule with an explicit runas list allowed a user to
  run sudo commands as themselves.
- Fixed a bug that prevented the user from specifying a group on the command line
  via "sudo -g" if the rule's Runas_Spec contained a Runas_Alias.
- Fixed regressions in sudo 1.9.13:
 + Fixed a bug that resulted in a missing " ; " separator between environment
   variables and the command in log entries.

* Mon Apr 17 2023 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.13p3-alt1
- Update to latest stable release with regressions.
- Fixed a bug that could cause sudo to hang when running a command
  in a pseudo-terminal when there is still input buffered after a
  command has exited.
- Fixed regressions in sudo 1.9.13:
 + Fixed a bug introduced in sudo 1.9.13 that caused a syntax error
   when "list" was used as a user or host name (GitHub #246).
 + Fixed "sudo -U otheruser -l command" (GitHub #248).
 + Fixed "sudo -l command args" when matching a command in sudoers
   with command line arguments (GitHub #249).

* Mon Feb 27 2023 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.13p2-alt1
- Update to latest stable release.
- Fix run_time message validation in logsrvd.
- Fixed a potential double-free bug when matching a sudoers rule
  that contains a per-command chroot directive (CHROOT=dir).

* Mon Feb 20 2023 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.13p1-alt1
- Update to latest stable release.
- Fixed potential memory leaks in error paths (GitHub#199, GitHub#202).
- Fixed potential NULL dereferences on memory allocation failure (GitHub#204,
  GitHub#211).
- A missing include file in sudoers is no longer a fatal error
  unless the error_recovery plugin argument has been set to false.
- Fixed a bug running relative commands via sudo when "log_subcmds"
  is enabled (GitHub#194).
- Fixed a signal handling bug when running sudo commands in a shell
  script.  Signals were not being forwarded to the command when
  the sudo process was not run in its own process group.
- Added a reminder to the default lecture that the password will
  not echo. This line is only displayed when the pwfeedback option
  is disabled (GitHub#195).
- Regular expressions in sudoers or logsrvd.conf may no longer contain
  consecutive repetition operators.  This is implementation-specific behavior
  according to POSIX, but some implementations will allocate excessive amounts
  of memory. This mainly affects the fuzzers.
- Sudo no longer checks the ownership and mode of the plugins that it loads.
  Plugins are configured via either the sudo.conf or sudoers file which are
  trusted configuration files.
- Fixed a bug executing a command with a very long argument vector when
  "log_subcmds" or "intercept" is enabled on a system where "intercept_type"
  is set to "trace" (GitHub#194).

* Sun Jan 22 2023 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.12p2-alt1
- Update to latest stable bugfix and security release (closes: 44965).
- Fixed a compilation error on Linux/aarch64 (GitHub#197).
- Fixed a potential crash introduced in the fix for (GitHub#134):
 + If a user's sudoers entry did not have any RunAs user's set, running
   "sudo -U otheruser -l" would dereference a NULL pointer.
- Fixed a bug introduced in sudo 1.9.12 that could prevent sudo from creating
  a I/O files when the "iolog_file" sudoers setting contains six or more Xs.
- Fixed security issue (fixes: CVE-2023-22809), a flaw in sudo's -e option (aka
  sudoedit) that could allow a malicious user with sudoedit privileges to edit
  arbitrary files.

* Mon Nov 07 2022 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.12p1-alt1
- Update to latest stable bugfix and security release (fixes: CVE-2022-43995).
- Major improvements from latest Sisyphus release:
 + For ptrace-based intercept mode, sudo will now attempt to verify that the
   command path name, arguments and environment have not changed from the time
   when they were authorized by the security policy. The new intercept_verify
   sudoers setting can be used to control this behavior.
 + Sudo now supports passing the execve(2) system call the NULL pointer for the
   argv and/or envp arguments when in intercept mode. Linux treats a NULL pointer
   like an empty array.
 + Neovim has been added to the list of visudo editors that support passing the
   line number on the command line.
 + Added a new -N (no-update) command line option to sudo which can be used to
   prevent sudo from updating the user's cached credentials.
 + PAM approval modules are no longer invoked when running sub-commands in
   intercept mode unless the intercept_authenticate option is set. There is a
   substantial performance penalty for calling into PAM for each command run.
   PAM approval modules are still called for the initial command.
 + Intercept mode on Linux now uses process_vm_readv(2) and process_vm_writev(2)
   if available.
 + The XDG_CURRENT_DESKTOP environment variable is now preserved by default.
   This makes it possible for graphical applications to choose the correct theme
   when run via sudo.
 + The cvtsudoers manual now documents the JSON and CSV output formats.
 + The new log_stdin, log_stdout, log_stderr, log_ttyin, and log_ttyout sudoers
   settings can be used to support more fine-grained I/O logging. The sudo
   front-end no longer allocates a pseudo-terminal when running a command if the
   I/O logging plugin requests logging of stdin, stdout, or stderr but not
   terminal input/output.
 + Added the -I option to visudo which only edits the main sudoers file.
   Include files are not edited unless a syntax error is found.

* Mon Nov 07 2022 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.11p3-alt4
- Rebuild with upstream sources from https://github.com/sudo-project/sudo
  (manual import of archives no more needed).

* Mon Oct 24 2022 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.11p3-alt3
- Add sudopw control with rule Defaults for user, root, target or runas type
  of user account password credentials that are verified during authentication.

* Fri Oct 21 2022 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.11p3-alt2
- Fix sudowheel control to be more flexible and supported the default 'ALL:ALL'
  Runas_Spec with group alias specified.
- Fix initialization error in post-scripts for sudoreplay and sudowheel controls
  during first installation process (closes: 41907).

* Thu Oct 20 2022 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.11p3-alt1
- Update to latest stable release.
- Major improvemnents from latest Sisyphus release:
 + Added new log_passwords and passprompt_regex settings to sudo_logsrvd that
   operate like the sudoers options when logging terminal input.
 + A new noninteractive_auth sudoers option has been added to enable PAM
   authentication in non-interactive mode.
 + When sudo is run in non-interactive mode (with the -n option), it will now
   attempt PAM authentication and only exit with an error if user interaction is
   required.
 + The intercept and log_subcmds functionality can now use ptrace(2) on Linux
   systems that support seccomp(2) filtering.
- Tweak default password prompt as %%u doesn't make sense. Improve it by old fix
  from Patrick Schoenfeld that adds a %%p and uses it by default (closes: 38612).

* Mon Oct 11 2021 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.8p2-alt1
- Fixed minor troubles and regressions.

* Thu Sep 16 2021 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.8-alt1
- Update to latest stable release with support transparently intercepting
  sub-commands executed by the original command run via sudo.

* Sat Sep 11 2021 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.7p2-alt1
- Update to latest stable release with bugfixes and improvements:
 + Sudo now can handle the getgroups() function returning a different
   number of groups for subsequent invocations.

* Fri May 14 2021 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.7-alt1
- Update to latest stable release

* Fri May 14 2021 Nikolai Kostrigin <nickel@altlinux.org> 1:1.9.6p1-alt2
- Fix missing word typo in Russian translation file

* Thu Mar 25 2021 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.6p1-alt1
- Update to latest bugfix release of the sudo 1.9

* Wed Jan 27 2021 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.5p2-alt2
- Set sudo python plugin to be definable and enabled by default

* Wed Jan 27 2021 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.5p2-alt1
- Update to latest security release (fixes: CVE-2021-3156) (closes: 39615)
- Added sudo-python package with Sudo Python Plugin API
- Added sudo-logsrvd package with High-performance log server

* Fri Nov 13 2020 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.3p1-alt1
- Update to latest release
- Enable python policy support

* Sun Aug 30 2020 Evgeny Sinelnikov <sin@altlinux.org> 1:1.9.2-alt1
- Update to latest release of the sudo 1.9 (Fixes: CVE-2019-19232, CVE-2019-19234)
- Added sudo event and I/O log server
- Added send sudo I/O log to log server utility
- Added selinux support
- Added native audit support

* Sun Aug 30 2020 Evgeny Sinelnikov <sin@altlinux.org> 1:1.8.31p2-alt1
- Update to latest release (Fixes: CVE-2019-18634)

* Tue Oct 15 2019 Evgeny Sinelnikov <sin@altlinux.org> 1:1.8.28-alt1
- Update to autumn security release (closes: 37334)
- Code execution with euid==0 in rare box configurations (fixes: CVE-2019-14287)
- Fix post script for sudowheel control in case of upgrade in not default state

* Thu Apr 11 2019 Evgeny Sinelnikov <sin@altlinux.org> 1:1.8.27-alt1
- Update to last winter release

* Fri Dec 07 2018 Evgeny Sinelnikov <sin@altlinux.org> 1:1.8.26-alt1
- Update to last autumn release
- Fix post script for sudowheel control (closes: 35611)

* Thu Nov 08 2018 Evgeny Sinelnikov <sin@altlinux.org> 1:1.8.25p1-alt2
- Reapply replace libsudo_util.so to libexecdir (avoid rpath in binaries)
- Set sudowheel control with rule "ALL=(ALL) ALL" for wheel users disabled
  by default (closes: 18344)

* Tue Nov 06 2018 Evgeny Sinelnikov <sin@altlinux.org> 1:1.8.25p1-alt1
- Update to latest release
- Disable ubt macros due binary package identity change
- Replace libsudo_util.so to libexecdir
- Add new cvtsudoers utility

* Fri Apr 27 2018 Evgeny Sinelnikov <sin@altlinux.org> 1:1.8.22-alt1
- Update to latest winter release
- Add sudowheel control with rule "ALL=(ALL) ALL" for wheel users enabled
  by default (closes: 18344)

* Thu Nov 23 2017 Evgeny Sinelnikov <sin@altlinux.org> 1:1.8.21p2-alt1
- Update to latest autumn release

* Fri Jun 02 2017 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.20p2-alt1
- Update to first summer security release

* Wed May 31 2017 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.20p1-alt1
- Update to spring security release ((Fixes: CVE-2017-1000367)

* Mon May 29 2017 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.20-alt1
- Update to latest spring release

* Tue Jan 10 2017 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.19p1-alt6
- Add compatibility trigger for /etc/sudoers.d and /etc/sudo.d
- Avoid sudoreplay pre and post control warnings

* Mon Jan 02 2017 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.19p1-alt5
- Add warning if /etc/sudo.d directory exixsts

* Wed Dec 28 2016 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.19p1-alt4
- Disable sudo rule for root by default

* Tue Dec 27 2016 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.19p1-alt3
- Fixed relaxed control rule for sudoers

* Mon Dec 26 2016 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.19p1-alt2
- Build without *.la files in modules directory

* Wed Dec 21 2016 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.19p1-alt1
- Updated to last stable release 1.8.19p1 with sssd features

* Thu Aug 04 2016 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.17p1-alt2
- Fixed new sudoers template with sudoers.control settings

* Thu Jul 28 2016 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.17p1-alt1
- Updated to last stable release 1.8.17p1

* Tue Jun 30 2015 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.13-alt1
- Updated to last stable release 1.8.13

* Mon Jan 27 2014 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.9p4-alt1
- Updated to last stable release 1.8.9p4

* Mon Oct 07 2013 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.8-alt1
- Updated to new relrease 1.8.8

* Fri Oct 04 2013 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.6p8-alt1
- Updated to 1.8.6p8

* Tue Feb 12 2013 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.6p6-alt1
- Updated to 1.8.6p6

* Wed Jan 16 2013 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.6p4-alt1
- Updated to 1.8.6p4

* Wed Dec 19 2012 Evgeny Sinelnikov <sin@altlinux.ru> 1:1.8.6p3-alt1
- Updated to 1.8.6p3
- Enabled /etc/sudoers.d by default (for new installations)
- Added sudo-devel package for plugin development

* Fri Jul 13 2012 Vitaly Kuznetsov <vitty@altlinux.ru> 1:1.6.8p12-alt12
- Dropped /etc/sudo.d from package and Provides, handling left for
  compatibility.

* Thu Jul 12 2012 Vitaly Kuznetsov <vitty@altlinux.ru> 1:1.6.8p12-alt11
- Implemented /etc/sudoers.d support to provide upstream-compatibility
  /etc/sudo.d support left for backward compatibility.

* Thu Jul 12 2012 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt10
- Fixed generation of man pages (by george@; closes: #27479).

* Thu May 24 2012 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt9
- Relocated sudo timestamp directory: /var/run/sudo -> /var/lib/sudo.

* Tue Jun 01 2010 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt8
- Backported upstream fix for CVE-2010-1163 (env_reset, ignore_dot and
  secure_path sudoers options all had to be explicitly disabled
  to make an attack possible).
- Backported upstream fix for CVE-2010-1646 (env_reset sudoers option
  had to be explicitly disabled to make an attack possible).

* Tue Feb 23 2010 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt7
- Backported upstream fix for CVE-2010-0426 (a flaw in sudoedit could
  give a user with permission to run sudoedit the ability to run
  arbitrary commands; env_reset sudoers option had to be
  explicitly disabled to make an attack possible).

* Wed May 06 2009 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt6
- Fixed build with fresh libtool.

* Mon Jan 21 2008 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt5
- Documented that set_home is on by default due to --enable-shell-sets-home.
- Configured less confusing default password prompt (#13719).
- Fixed build with autoconf-2.61.

* Sat Aug 04 2007 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt4
- Fixed typo in configure check (george, #12449, #12462).
- sudoers (#11753):
  + Added DISPLAY and XAUTHORITY to env_keep for "xgrp" group members.
  + Added "!env_reset" example.
  + Added sudoers environment control.

* Tue May 22 2007 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt3
- Forced manpage generation from .pod files.
- sudoers: Added "DISPLAY" to env_keep.

* Sat May 05 2007 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt2
- Reverted change to requiretty default value.
- Resurrected tgetpass fix from 1.6.6-alt3.

* Tue Apr 17 2007 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.8p12-alt1
- Updated to 1.6.8p12 with backports from HEAD.
- Enabled env_reset, requiretty and tty_tickets options by default.

* Thu Jan 12 2006 ALT QA Team Robot <qa-robot@altlinux.org> 1:1.6.7p5-alt6.1
- Rebuilt for new style PAM dependencies generated by rpm-build-4.0.4-alt55.

* Fri Aug 26 2005 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.7p5-alt6
- Added system logger initialization, removed closelog() calls.

* Tue Jun 21 2005 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.7p5-alt5
- Backported upstream fix so a sudoers entry with sudo ALL no longer
  overwrites the value of safe_cmnd (CAN-2005-1993).

* Fri Nov 12 2004 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.7p5-alt4
- Backported upstream fix that restricts exporting of shell functions
  and CDPATH shell variable (CAN-2004-1051).
- Added help to control.

* Thu Mar 11 2004 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.7p5-alt3
- Changed "listpw" default value from "any" to "all".

* Wed Mar 10 2004 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.7p5-alt2
- Fixed build with fresh autotools.

* Tue Jul 29 2003 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.7p5-alt1
- Updated to 1.6.7p5.

* Sat May 24 2003 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.7p2-alt2
- PAM configuration policy enforcement.

* Tue Apr 08 2003 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.7p2-alt1
- Updated to 1.6.7p2, updated patches.
- Enable setting $HOME to target user in shell mode.
- Keep sudo at mode "restricted" in the package, but default it
  to "wheelonly" in %post when the package is first installed.
  This avoids a race and fail-open behavior (like in su package).

* Thu Oct 17 2002 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.6-alt4
- Added control support for sudo.

* Sun Sep 01 2002 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.6-alt3
- tgetpass: The /dev/tty _must_ be opened for reading/writing unless
  requested to use stdin/stderr.

* Fri May 17 2002 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.6-alt2
- Set default visudo(8) editor to vitmp(1).

* Mon May 13 2002 Dmitry V. Levin <ldv@altlinux.org> 1:1.6.6-alt1
- 1.6.6

* Fri Apr 19 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.5p2-alt3
- Applied patch from Tom Parker.

* Mon Jan 28 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.5p2-alt2
- Added %_sysconfdir/sudo.d

* Thu Jan 24 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.5p2-alt1
- 1.6.5p2.
- Built with --disable-saved-ids.

* Thu Jan 24 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.5p1-alt2
- Rebuilt with bison-1.31-alt2.

* Mon Jan 21 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.5p1-alt1
- 1.6.5p1.

* Thu Jan 17 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.5-alt1
- 1.6.5 final.

* Tue Jan 15 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.4-alt2
- Fixed nasty typo in description.

* Mon Jan 14 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.4-alt1
- 1.6.4 final.

* Sun Jan 13 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.4-alt0.1rc4
- 1.6.4rc4, which fixes set_perms_posix problem.

* Sat Jan 12 2002 Dmitry V. Levin <ldv@alt-linux.org> 1:1.6.4-alt0.1rc3
- 1.6.4rc3, updated patches.
- Explicitly set sudoers mode to 0400.
- Disabled broken set_perms_posix introduced in new version.
- Cleaned up list of linked libraries.

* Sun Apr 22 2001 Dmitry V. Levin <ldv@altlinux.ru> 1.6.3p7-ipl3mdk
- Fixed progname usage.
- Fixed SECURE_PATH.
- Enabled: --with-secure-path --with-env-editor --with-editor=/bin/vi.
- Implemented optional sudoers file for visudo.
- implemented sudoers lookup in %_sysconfdir/sudo.d directory.

* Mon Mar 05 2001 Dmitry V. Levin <ldv@fandra.org> 1.6.3p7-ipl2mdk
- Corrected license information.

* Sat Mar 03 2001 Dmitry V. Levin <ldv@fandra.org> 1.6.3p7-ipl1mdk
- 1.6.3p7

* Tue Feb 20 2001 Dmitry V. Levin <ldv@fandra.org> 1.6.3p6-ipl1mdk
- 1.6.3p6

* Wed Feb 14 2001 Dmitry V. Levin <ldv@fandra.org> 1.6.3p5-ipl5mdk
- Added set of PAM_TTY.

* Wed Dec 27 2000 Dmitry V. Levin <ldv@fandra.org> 1.6.3p5-ipl4mdk
- Commented out translations in specfile for a while.

* Fri Oct 13 2000 Dmitry V. Levin <ldv@fandra.org> 1.6.3p5-ipl3mdk
- Updated pam configuration.
- Changed syslog facility to log with from local2 to authpriv.

* Fri Sep 01 2000 Dmitry V. Levin <ldv@fandra.org> 1.6.3p5-ipl2mdk
- Russian translations.

* Mon Aug 14 2000 Dmitry V. Levin <ldv@fandra.org> 1.6.3p5-ipl1mdk
- 1.6.3p5

* Wed Jun 07 2000 Dmitry V. Levin <ldv@fandra.org> 1.6.3p4-ipl1mdk
- 1.6.3p4

* Mon May 15 2000 Dmitry V. Levin <ldv@fandra.org> 1.6.3p3-ipl1mdk
- 1.6.3p3

* Thu May 04 2000 Dmitry V. Levin <ldv@fandra.org>
- Fandra adaptions

* Fri Apr 07 2000 Chmouel Boudjnah <chmouel@mandrakesoft.com> 1.6.2p2-3mdk
- Set /etc/sudoers as 0440.

* Fri Apr 7 2000 Denis Havlik <denis@mandrakesoft.com> 1.6.2p2-2mdk
- Group: System/Base
- fixed config files

* Mon Feb 28 2000 Chmouel Boudjnah <chmouel@mandrakesoft.com> 1.6.2p2-1mdk
- 1.62p2.

* Wed Feb  9 2000 Chmouel Boudjnah <chmouel@mandrakesoft.com> 1.6.2p1-1mdk
- 1.6.2p1.
- specs teak.

* Thu Jul 29 1999 Chmouel Boudjnah <chmouel@mandrakesoft.com>
- Mandrake adaptations.

* Fri Jun  4 1999 Ryan Weaver <ryanw@infohwy.com>
  [sudo-1.5.9p3-1]
- Updated to version 1.5.9p3
- Changed RPM name from cu-sudo tp sudo.

* Fri Jun  4 1999 Ryan Weaver <ryanw@infohwy.com>
  [cu-sudo-1.5.9p2-1]
- Added dir /var/run/sudo to file list.
- Added --enable-log-host --disable-log-wrap to configure.
- Added --with-logging=file to configure.
- Added logrotate.d file to rotate /var/log/sudo.log monthly.

* Fri Jun  4 1999 Ryan Weaver <ryanw@infohwy.com>
  [cu-sudo-1.5.9p2-1]
- Initial RPM build.
- Installing sample pam file.