ports/50566: [PATCH] security/sudo update from 1.6.6 to 1.6.7p2
Sergey A.Osokin
osa at FreeBSD.org.ru
Thu Apr 3 16:00:08 UTC 2003
>Number: 50566
>Category: ports
>Synopsis: [PATCH] security/sudo update from 1.6.6 to 1.6.7p2
>Confidential: no
>Severity: non-critical
>Priority: medium
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: update
>Submitter-Id: current-users
>Arrival-Date: Thu Apr 03 08:00:06 PST 2003
>Closed-Date:
>Last-Modified:
>Originator: Sergey A. Osokin
>Release: FreeBSD 5.0-CURRENT i386
>Organization:
n/a
>Environment:
System: FreeBSD 5.0-CURRENT i386
>Description:
security/sudo update from 1.6.6 to 1.6.7p2
>How-To-Repeat:
>Fix:
rm ports/security/sudo/files/patch-aa
cvs rm ports/security/sudo/files/patch-aa
apply the following patch
Index: ports/security/sudo/Makefile
===================================================================
RCS file: /home/ncvs/ports/security/sudo/Makefile,v
retrieving revision 1.55
diff -u -r1.55 Makefile
--- ports/security/sudo/Makefile 7 Mar 2003 06:10:50 -0000 1.55
+++ ports/security/sudo/Makefile 3 Apr 2003 15:55:58 -0000
@@ -6,14 +6,14 @@
#
PORTNAME= sudo
-PORTVERSION= 1.6.6
-PORTREVISION= 1
+PORTVERSION= 1.6.7.2
+PORTREVISION?= 0
CATEGORIES= security
MASTER_SITES= http://www.sudo.ws/sudo/dist/ \
ftp://ftp.cs.colorado.edu/pub/sysadmin/sudo/ \
ftp://ftp.stikman.com/pub/sudo/ \
ftp://ftp.uu.net/pub/security/sudo/
-DISTNAME= ${PORTNAME}-1.6.6
+DISTNAME= ${PORTNAME}-1.6.7p2
MAINTAINER= mharo at FreeBSD.org
COMMENT= Allow others to run commands as root
Index: ports/security/sudo/distinfo
===================================================================
RCS file: /home/ncvs/ports/security/sudo/distinfo,v
retrieving revision 1.34
diff -u -r1.34 distinfo
--- ports/security/sudo/distinfo 25 Apr 2002 17:20:23 -0000 1.34
+++ ports/security/sudo/distinfo 3 Apr 2003 15:55:58 -0000
@@ -1 +1 @@
-MD5 (sudo-1.6.6.tar.gz) = 4da4bf6cf31634cc7a17ec3b69fdc333
+MD5 (sudo-1.6.7p2.tar.gz) = b94656cb96f43fa1bcfb47850a6e1192
Index: ports/security/sudo/files/patch-auth::pam.c
===================================================================
RCS file: /home/ncvs/ports/security/sudo/files/patch-auth::pam.c,v
retrieving revision 1.1
diff -u -r1.1 patch-auth::pam.c
--- ports/security/sudo/files/patch-auth::pam.c 13 Feb 2003 08:26:38 -0000 1.1
+++ ports/security/sudo/files/patch-auth::pam.c 3 Apr 2003 15:55:58 -0000
@@ -1,47 +1,16 @@
-Index: auth/pam.c
-===================================================================
-RCS file: /home/cvs/sudo/sudo/auth/pam.c,v
-retrieving revision 1.30
-retrieving revision 1.31
-diff -u -r1.30 -r1.31
---- auth/pam.c 22 Nov 2002 19:41:13 -0000 1.30
-+++ auth/pam.c 13 Dec 2002 16:33:26 -0000 1.31
-@@ -66,7 +66,7 @@
- #include "sudo_auth.h"
-
- #ifndef lint
--static const char rcsid[] = "$Sudo: pam.c,v 1.29 2002/01/22 16:43:23 millert Exp $";
-+static const char rcsid[] = "$Sudo: pam.c,v 1.30 2002/11/22 19:41:13 millert Exp $";
- #endif /* lint */
-
- static int sudo_conv __P((int, PAM_CONST struct pam_message **,
-@@ -205,7 +205,7 @@
- PAM_CONST struct pam_message *pm;
- const char *p = def_prompt;
- char *pass;
-- int n;
-+ int n, flags;
- extern int nil_pw;
-
- if ((*response = malloc(num_msg * sizeof(struct pam_response))) == NULL)
-@@ -213,17 +213,17 @@
- (void) memset(*response, 0, num_msg * sizeof(struct pam_response));
-
- for (pr = *response, pm = *msg, n = num_msg; n--; pr++, pm++) {
-+ flags = tgetpass_flags;
- switch (pm->msg_style) {
- case PAM_PROMPT_ECHO_ON:
-- tgetpass_flags |= TGP_ECHO;
-+ flags |= TGP_ECHO;
- case PAM_PROMPT_ECHO_OFF:
- /* Only override PAM prompt if it matches /^Password: ?/ */
- if (strncmp(pm->msg, "Password:", 9) || (pm->msg[9] != '\0'
- && (pm->msg[9] != ' ' || pm->msg[10] != '\0')))
+--- auth/pam.c.orig Wed Apr 2 11:55:50 2003
++++ auth/pam.c Wed Apr 2 11:57:32 2003
+@@ -224,11 +224,11 @@
p = pm->msg;
/* Read the password. */
-- pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60,
-- tgetpass_flags);
-+ pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60, flags);
- pr->resp = estrdup(pass ? pass : "");
+ pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60, flags);
+- pr->resp = estrdup(pass ? pass : "");
++ pr->resp = estrdup((const char *)pass ? (const char *)pass : "");
if (*pr->resp == '\0')
nil_pw = 1; /* empty password */
+ else
+- memset(pass, 0, strlen(pass));
++ memset((void *)pass, 0, strlen((const char *)pass));
+ break;
+ case PAM_TEXT_INFO:
+ if (pm->msg)
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list