Skip site navigation (1)Skip section navigation (2)
Date:      Mon,  7 Apr 2003 13:39:09 +0400 (MSD)
From:      "Sergey A.Osokin" <osa@FreeBSD.org.ru>
To:        FreeBSD-gnats-submit@FreeBSD.org
Cc:        mharo@FreeBSD.org
Subject:   ports/50666: [PATCH] security/sudo: update from 1.6.6 to 1.6.7p3
Message-ID:  <20030407093909.8CE3D5D@freebsd.org.ru>
Resent-Message-ID: <200304070940.h379eCZU011399@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         50666
>Category:       ports
>Synopsis:       [PATCH] security/sudo: update from 1.6.6 to 1.6.7p3
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Mon Apr 07 02:40:11 PDT 2003
>Closed-Date:
>Last-Modified:
>Originator:     Sergey A. Osokin
>Release:        FreeBSD 5.0-CURRENT i386
>Organization:
n/a
>Environment:
System: FreeBSD 5.0-CURRENT #30: Mon Mar 31 15:10:23 MSD 2003 i386

>Description:
	security/sudo: update from 1.6.6 to 1.6.7p3
>How-To-Repeat:
>Fix:

Close ports/50566
Delete patch-aa
% rm ports/securty/sudo/files/patch-aa
% cvs rm ports/securty/sudo/files/patch-aa

apply following patch

Index: ports/security/sudo/Makefile
===================================================================
RCS file: /home/ncvs/ports/security/sudo/Makefile,v
retrieving revision 1.55
diff -u -r1.55 Makefile
--- ports/security/sudo/Makefile	7 Mar 2003 06:10:50 -0000	1.55
+++ ports/security/sudo/Makefile	7 Apr 2003 09:29:07 -0000
@@ -6,14 +6,14 @@
 #
 
 PORTNAME=	sudo
-PORTVERSION=	1.6.6
-PORTREVISION=	1
+PORTVERSION=	1.6.7.3
+PORTREVISION?=	0
 CATEGORIES=	security
 MASTER_SITES=	http://www.sudo.ws/sudo/dist/ \
 		ftp://ftp.cs.colorado.edu/pub/sysadmin/sudo/ \
 		ftp://ftp.stikman.com/pub/sudo/ \
 		ftp://ftp.uu.net/pub/security/sudo/
-DISTNAME=	${PORTNAME}-1.6.6
+DISTNAME=	${PORTNAME}-1.6.7p3
 
 MAINTAINER=	mharo@FreeBSD.org
 COMMENT=	Allow others to run commands as root
Index: ports/security/sudo/distinfo
===================================================================
RCS file: /home/ncvs/ports/security/sudo/distinfo,v
retrieving revision 1.34
diff -u -r1.34 distinfo
--- ports/security/sudo/distinfo	25 Apr 2002 17:20:23 -0000	1.34
+++ ports/security/sudo/distinfo	7 Apr 2003 09:29:07 -0000
@@ -1 +1 @@
-MD5 (sudo-1.6.6.tar.gz) = 4da4bf6cf31634cc7a17ec3b69fdc333
+MD5 (sudo-1.6.7p3.tar.gz) = b3ed2959489f73b81eb9e528d308dd38
Index: ports/security/sudo/files/patch-auth::pam.c
===================================================================
RCS file: /home/ncvs/ports/security/sudo/files/patch-auth::pam.c,v
retrieving revision 1.1
diff -u -r1.1 patch-auth::pam.c
--- ports/security/sudo/files/patch-auth::pam.c	13 Feb 2003 08:26:38 -0000	1.1
+++ ports/security/sudo/files/patch-auth::pam.c	7 Apr 2003 09:29:07 -0000
@@ -1,47 +1,16 @@
-Index: auth/pam.c
-===================================================================
-RCS file: /home/cvs/sudo/sudo/auth/pam.c,v
-retrieving revision 1.30
-retrieving revision 1.31
-diff -u -r1.30 -r1.31
---- auth/pam.c	22 Nov 2002 19:41:13 -0000	1.30
-+++ auth/pam.c	13 Dec 2002 16:33:26 -0000	1.31
-@@ -66,7 +66,7 @@
- #include "sudo_auth.h"
- 
- #ifndef lint
--static const char rcsid[] = "$Sudo: pam.c,v 1.29 2002/01/22 16:43:23 millert Exp $";
-+static const char rcsid[] = "$Sudo: pam.c,v 1.30 2002/11/22 19:41:13 millert Exp $";
- #endif /* lint */
- 
- static int sudo_conv __P((int, PAM_CONST struct pam_message **,
-@@ -205,7 +205,7 @@
-     PAM_CONST struct pam_message *pm;
-     const char *p = def_prompt;
-     char *pass;
--    int n;
-+    int n, flags;
-     extern int nil_pw;
- 
-     if ((*response = malloc(num_msg * sizeof(struct pam_response))) == NULL)
-@@ -213,17 +213,17 @@
-     (void) memset(*response, 0, num_msg * sizeof(struct pam_response));
- 
-     for (pr = *response, pm = *msg, n = num_msg; n--; pr++, pm++) {
-+	flags = tgetpass_flags;
- 	switch (pm->msg_style) {
- 	    case PAM_PROMPT_ECHO_ON:
--		tgetpass_flags |= TGP_ECHO;
-+		flags |= TGP_ECHO;
- 	    case PAM_PROMPT_ECHO_OFF:
- 		/* Only override PAM prompt if it matches /^Password: ?/ */
- 		if (strncmp(pm->msg, "Password:", 9) || (pm->msg[9] != '\0'
- 		    && (pm->msg[9] != ' ' || pm->msg[10] != '\0')))
+--- auth/pam.c.orig	Wed Apr  2 11:55:50 2003
++++ auth/pam.c	Wed Apr  2 11:57:32 2003
+@@ -224,11 +224,11 @@
  		    p = pm->msg;
  		/* Read the password. */
--		pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60,
--		    tgetpass_flags);
-+		pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60, flags);
- 		pr->resp = estrdup(pass ? pass : "");
+ 		pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60, flags);
+-		pr->resp = estrdup(pass ? pass : "");
++		pr->resp = estrdup((const char *)pass ? (const char *)pass : "");
  		if (*pr->resp == '\0')
  		    nil_pw = 1;		/* empty password */
+ 		else
+-		    memset(pass, 0, strlen(pass));
++		    memset((void *)pass, 0, strlen((const char *)pass));
+ 		break;
+ 	    case PAM_TEXT_INFO:
+ 		if (pm->msg)
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030407093909.8CE3D5D>