SOURCES: sudo-ac.patch, sudo-pam-login.patch, sudo-selinux.patch -...

qboosh qboosh at pld-linux.org
Sun Aug 5 00:29:32 CEST 2007


Author: qboosh                       Date: Sat Aug  4 22:29:32 2007 GMT
Module: SOURCES                       Tag: HEAD
---- Log message:
- updated for 1.6.9p3

---- Files affected:
SOURCES:
   sudo-ac.patch (1.3 -> 1.4) , sudo-pam-login.patch (1.1 -> 1.2) , sudo-selinux.patch (1.4 -> 1.5) 

---- Diffs:

================================================================
Index: SOURCES/sudo-ac.patch
diff -u SOURCES/sudo-ac.patch:1.3 SOURCES/sudo-ac.patch:1.4
--- SOURCES/sudo-ac.patch:1.3	Tue Sep  5 15:53:08 2006
+++ SOURCES/sudo-ac.patch	Sun Aug  5 00:29:27 2007
@@ -1,51 +1,11 @@
-diff -Nur sudo-1.6.8p12.orig/acinclude.m4 sudo-1.6.8p12.ac/acinclude.m4
---- sudo-1.6.8p12.orig/acinclude.m4	2004-09-07 20:14:51.000000000 +0300
-+++ sudo-1.6.8p12.ac/acinclude.m4	2006-09-05 16:50:19.000000000 +0300
-@@ -224,9 +224,9 @@
- rm -f core core.* *.core])dnl
- AC_MSG_RESULT($sudo_cv_func_fnmatch)
- if test $sudo_cv_func_fnmatch = yes; then
--  [$1]
-+  $1
- else
--  [$2]
-+  $2
- fi
- ])
- 
-diff -Nur sudo-1.6.8p12.orig/configure.in sudo-1.6.8p12.ac/configure.in
---- sudo-1.6.8p12.orig/configure.in	2006-09-05 16:50:19.000000000 +0300
-+++ sudo-1.6.8p12.ac/configure.in	2006-09-05 16:51:03.000000000 +0300
-@@ -1609,7 +1609,7 @@
+--- sudo-1.6.9p3/configure.in.orig	2007-08-04 23:19:04.049674000 +0200
++++ sudo-1.6.9p3/configure.in	2007-08-04 23:32:22.943201056 +0200
+@@ -1975,7 +1975,7 @@
      AC_CHECK_FUNCS(getspnam, [CHECKSHADOW="false"], [AC_CHECK_LIB(gen, getspnam, AC_DEFINE(HAVE_GETSPNAM) [SUDO_LIBS="${SUDO_LIBS} -lgen"; LIBS="${LIBS} -lgen"])])
  fi
  if test "$CHECKSHADOW" = "true"; then
 -    AC_CHECK_FUNC(getprpwnam, [AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1], AC_CHECK_LIB(sec, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsec"; LIBS="${LIBS} -lsec"], AC_CHECK_LIB(security, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsecurity"; LIBS="${LIBS} -lsecurity"], AC_CHECK_LIB(prot, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lprot"; LIBS="${LIBS} -lprot"])))])
-+    AC_CHECK_FUNC(getprpwnam, [AC_DEFINE(HAVE_GETPRPWNAM) AC_CHECK_LIB(sec, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsec"; LIBS="${LIBS} -lsec"], AC_CHECK_LIB(security, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsecurity"; LIBS="${LIBS} -lsecurity"], AC_CHECK_LIB(prot, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lprot"; LIBS="${LIBS} -lprot"]))) [CHECKSHADOW="false"; SECUREWARE=1]])
++    AC_CHECK_FUNC(getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1], AC_CHECK_LIB(sec, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsec"; LIBS="${LIBS} -lsec"], AC_CHECK_LIB(security, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsecurity"; LIBS="${LIBS} -lsecurity"], AC_CHECK_LIB(prot, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lprot"; LIBS="${LIBS} -lprot"]))))
  fi
- 
- dnl
-@@ -1703,9 +1703,9 @@
- AC_CHECK_FUNCS(lockf flock, [break])
- AC_CHECK_FUNCS(waitpid wait3, [break])
- AC_CHECK_FUNCS(innetgr _innetgr, [AC_CHECK_FUNCS(getdomainname) [break]])
--AC_CHECK_FUNCS(lsearch, , [AC_CHECK_LIB(compat, lsearch, AC_CHECK_HEADER(search.h, AC_DEFINE(HAVE_LSEARCH) [LIBS="${LIBS} -lcompat"], AC_LIBOBJ(lsearch), -), AC_LIBOBJ(lsearch))])
-+AC_CHECK_FUNCS(lsearch, , [AC_CHECK_LIB(compat, lsearch, [AC_CHECK_HEADER(search.h, AC_DEFINE(HAVE_LSEARCH) [LIBS="${LIBS} -lcompat"], [AC_LIBOBJ(lsearch)], -)], [AC_LIBOBJ(lsearch)])])
- AC_CHECK_FUNCS(utimes, [AC_CHECK_FUNCS(futimes futimesat, [break])], [AC_CHECK_FUNCS(futime) AC_LIBOBJ(utimes)])
--SUDO_FUNC_FNMATCH(AC_DEFINE(HAVE_FNMATCH), AC_LIBOBJ(fnmatch))
-+SUDO_FUNC_FNMATCH(AC_DEFINE(HAVE_FNMATCH), [AC_LIBOBJ(fnmatch)])
- SUDO_FUNC_ISBLANK
- AC_REPLACE_FUNCS(strerror strcasecmp sigaction strlcpy strlcat closefrom)
- AC_CHECK_FUNCS(snprintf vsnprintf asprintf vasprintf, , [NEED_SNPRINTF=1])
-diff -Nur sudo-1.6.8p12.orig/Makefile.in sudo-1.6.8p12.ac/Makefile.in
---- sudo-1.6.8p12.orig/Makefile.in	2006-09-05 16:50:19.000000000 +0300
-+++ sudo-1.6.8p12.ac/Makefile.in	2006-09-05 16:50:19.000000000 +0300
-@@ -187,7 +187,7 @@
- 	$(CC) -o $@ $(TESTOBJS) $(LIBOBJS) $(LDFLAGS) $(LIBS) $(NET_LIBS)
- 
- sudo_noexec.la: sudo_noexec.lo
--	$(LIBTOOL) --mode=link $(CC) $(LDFLAGS) -o $@ sudo_noexec.lo -avoid-version -rpath $(noexecdir)
-+	$(LIBTOOL) --mode=link $(CC) $(LDFLAGS) -o $@ sudo_noexec.lo -module -avoid-version -rpath $(noexecdir)
- 
- # Uncomment the following if you want "make distclean" to clean the parser
- @DEV at PARSESRCS = sudo.tab.h sudo.tab.c lex.yy.c def_data.c def_data.h
+ if test -n "$SECUREWARE"; then
+     AC_CHECK_FUNCS(bigcrypt set_auth_parameters initprivs)

================================================================
Index: SOURCES/sudo-pam-login.patch
diff -u SOURCES/sudo-pam-login.patch:1.1 SOURCES/sudo-pam-login.patch:1.2
--- SOURCES/sudo-pam-login.patch:1.1	Tue Mar 27 17:29:48 2007
+++ SOURCES/sudo-pam-login.patch	Sun Aug  5 00:29:27 2007
@@ -18,42 +18,24 @@
  AC_ARG_WITH(AFS, [  --with-AFS              enable AFS support],
  [case $with_AFS in
      yes)	AC_DEFINE(HAVE_AFS)
---- sudo-1.6.8p12/sudo.c.login	2006-07-16 15:39:26.000000000 +0200
-+++ sudo-1.6.8p12/sudo.c	2006-07-16 15:41:42.000000000 +0200
-@@ -109,7 +109,7 @@
- static struct passwd *get_authpw	__P((void));
- extern int sudo_edit			__P((int, char **));
- extern void list_matches		__P((void));
--extern char **rebuild_env		__P((char **, int, int));
-+extern char **rebuild_env		__P((char **, int));
- extern char **zero_env			__P((char **));
- extern struct passwd *sudo_getpwnam	__P((const char *));
- extern struct passwd *sudo_getpwuid	__P((uid_t));
-@@ -140,6 +140,7 @@
+--- sudo-1.6.9p3/sudo.c.orig	2007-08-04 22:30:23.307231082 +0200
++++ sudo-1.6.9p3/sudo.c	2007-08-04 22:31:28.238931329 +0200
+@@ -164,6 +164,7 @@
+ char *login_style;
  #endif /* HAVE_BSD_AUTH_H */
  sigaction_t saved_sa_int, saved_sa_quit, saved_sa_tstp, saved_sa_chld;
- void (*set_perms) __P((int));
 +int sudo_mode;
  
- 
- int
-@@ -151,7 +152,6 @@
+ #ifdef WITH_SELINUX
+ security_context_t setup_tty_context(int fd, char *ttyn, security_context_t new_context) {
+@@ -319,7 +320,6 @@
      int validated;
      int fd;
      int cmnd_status;
 -    int sudo_mode;
      int pwflag;
-     char **new_environ;
      sigaction_t sa;
-@@ -368,7 +368,7 @@
- 
-     /* Build a new environment that avoids any nasty bits if we have a cmnd. */
-     if (ISSET(sudo_mode, MODE_RUN))
--	new_environ = rebuild_env(envp, sudo_mode, ISSET(validated, FLAG_NOEXEC));
-+	new_environ = rebuild_env(envp, ISSET(validated, FLAG_NOEXEC));
-     else
- 	new_environ = envp;
- 
+     extern int printmatches;
 --- sudo-1.6.8p12/auth/pam.c.login	2006-07-16 15:41:59.000000000 +0200
 +++ sudo-1.6.8p12/auth/pam.c	2006-07-16 15:45:15.000000000 +0200
 @@ -89,7 +89,12 @@
@@ -70,38 +52,16 @@
      if (pam_status != PAM_SUCCESS) {
  	log_error(USE_ERRNO|NO_EXIT|NO_MAIL, "unable to initialize PAM");
  	return(AUTH_FATAL);
---- sudo-1.6.8p12/env.c.login	2006-07-16 15:40:14.000000000 +0200
-+++ sudo-1.6.8p12/env.c	2006-07-16 15:57:19.000000000 +0200
-@@ -77,7 +77,7 @@
- /*
-  * Prototypes
-  */
--char **rebuild_env		__P((char **, int, int));
-+char **rebuild_env		__P((char **, int));
- char **zero_env			__P((char **));
- static void insert_env		__P((char *, int));
- static char *format_env		__P((char *, ...));
-@@ -321,9 +321,8 @@
-  * Also adds sudo-specific variables (SUDO_*).
-  */
- char **
--rebuild_env(envp, sudo_mode, noexec)
-+rebuild_env(envp, noexec)
-     char **envp;
--    int sudo_mode;
-     int noexec;
- {
-     char **ep, *cp, *ps1;
---- sudo-1.6.8p12/sudo.h.login	2006-07-16 15:59:08.000000000 +0200
-+++ sudo-1.6.8p12/sudo.h	2006-07-16 15:59:38.000000000 +0200
-@@ -251,6 +251,7 @@
+--- sudo-1.6.9p3/sudo.h.orig	2007-07-06 16:14:34.000000000 +0200
++++ sudo-1.6.9p3/sudo.h	2007-08-04 22:32:18.353787210 +0200
+@@ -268,6 +268,7 @@
  extern FILE *sudoers_fp;
  extern int tgetpass_flags;
  extern uid_t timestamp_uid;
 +extern int sudo_mode;
- 
- extern void (*set_perms) __P((int));
  #endif
+ #ifndef errno
+ extern int errno;
 --- sudo-1.6.8p12/config.h.in.login	2006-07-16 15:32:09.000000000 +0200
 +++ sudo-1.6.8p12/config.h.in	2006-07-16 15:32:56.000000000 +0200
 @@ -230,6 +230,9 @@

================================================================
Index: SOURCES/sudo-selinux.patch
diff -u SOURCES/sudo-selinux.patch:1.4 SOURCES/sudo-selinux.patch:1.5
--- SOURCES/sudo-selinux.patch:1.4	Sun Sep 19 12:36:14 2004
+++ SOURCES/sudo-selinux.patch	Sun Aug  5 00:29:27 2007
@@ -51,20 +51,20 @@
 +    exit(-1);
 +  }
 +}
---- sudo-1.6.7p5/configure.in.selinux	2003-05-06 11:22:36.000000000 -0400
-+++ sudo-1.6.7p5/configure.in	2004-07-08 13:18:28.000000000 -0400
-@@ -90,7 +90,7 @@
+--- sudo-1.6.9p3/configure.in.orig	2007-07-30 15:30:15.000000000 +0200
++++ sudo-1.6.9p3/configure.in	2007-08-04 22:13:39.950053015 +0200
+@@ -101,7 +101,7 @@
  dnl Initial values for Makefile variables listed above
  dnl May be overridden by environment variables..
  dnl
 -PROGS="sudo visudo"
 +PROGS="sudo visudo sesh"
- test -n "$MANTYPE" || MANTYPE="man"
- test -n "$mansrcdir" || mansrcdir="."
- test -n "$SUDOERS_MODE" || SUDOERS_MODE=0440
---- sudo-1.6.8/sudo.c.orig	2004-08-07 01:42:52.000000000 +0200
-+++ sudo-1.6.8/sudo.c	2004-08-29 20:45:31.556903000 +0200
-@@ -92,6 +92,17 @@
+ : ${MANTYPE='man'}
+ : ${mansrcdir='.'}
+ : ${SUDOERS_MODE='0440'}
+--- sudo-1.6.9p3/sudo.c.orig	2007-07-22 21:21:01.000000000 +0200
++++ sudo-1.6.9p3/sudo.c	2007-08-04 22:15:26.464122906 +0200
+@@ -101,6 +101,17 @@
  #include "interfaces.h"
  #include "version.h"
  
@@ -80,11 +80,11 @@
 +#endif
 +
  #ifndef lint
- static const char rcsid[] = "$Sudo: sudo.c,v 1.369 2004/08/06 23:42:52 millert Exp $";
+ __unused __unused static const char rcsid[] = "$Sudo: sudo.c,v 1.369.2.26 2007/07/22 19:21:01 millert Exp $";
  #endif /* lint */
-@@ -141,7 +152,151 @@
+@@ -154,7 +165,151 @@
+ #endif /* HAVE_BSD_AUTH_H */
  sigaction_t saved_sa_int, saved_sa_quit, saved_sa_tstp, saved_sa_chld;
- void (*set_perms) __P((int));
  
 +#ifdef WITH_SELINUX
 +security_context_t setup_tty_context(int fd, char *ttyn, security_context_t new_context) {
@@ -119,7 +119,7 @@
 +
 +  security_context_t old_context=NULL;	/* our original securiy ID ("old_context") */
 +  security_context_t new_context=NULL;  /* our target security ID ("sid") */
-+
+ 
 +  /*
 +   *	
 +   * Step 1:  Handle command-line arguments.
@@ -229,24 +229,12 @@
 +
 +  return new_context;
 +}
- 
++
 +#endif
  int
  main(argc, argv, envp)
      int argc;
-@@ -149,10 +304,10 @@
-     char **envp;
- {
-     int validated;
--    int fd;
-     int cmnd_status;
-     int sudo_mode;
-     int pwflag;
-+    int fd;
-     char **new_environ;
-     sigaction_t sa;
-     extern int printmatches;
-@@ -203,9 +358,6 @@
+@@ -216,9 +371,6 @@
      /* Setup defaults data structures. */
      init_defaults();
  
@@ -256,8 +244,8 @@
      pwflag = 0;
      if (ISSET(sudo_mode, MODE_SHELL))
  	user_cmnd = "shell";
-@@ -219,6 +371,8 @@
- 		    putchar('\n');
+@@ -233,6 +385,8 @@
+ 		    (void) printf("Sudoers path: %s\n", _PATH_SUDOERS);
  		    dump_auth_methods();
  		    dump_defaults();
 +		    /* Load the list of local ip addresses and netmasks.  */
@@ -265,7 +253,7 @@
  		    dump_interfaces();
  		}
  		exit(0);
-@@ -445,7 +599,43 @@
+@@ -442,7 +596,43 @@
  #ifndef PROFILING
  	if (ISSET(sudo_mode, MODE_BACKGROUND) && fork() > 0)
  	    exit(0);
@@ -307,12 +295,12 @@
 +	  }
 +	}
 +#endif
- 	    EXECV(safe_cmnd, NewArgv);	/* run the command */
+ 	    execve(safe_cmnd, NewArgv, environ);
  #else
  	exit(0);
-@@ -729,6 +919,30 @@
- 		NewArgv++;
- 		break;
+@@ -766,6 +956,30 @@
+ 		    NewArgv++;
+ 		    break;
  #endif
 +#ifdef WITH_SELINUX
 +	    case 'r':
@@ -339,9 +327,9 @@
 +		break;
 +#endif
  #ifdef HAVE_LOGIN_CAP_H
- 	    case 'c':
- 		/* Must have an associated login class. */
-@@ -1111,6 +1325,9 @@
+ 		case 'c':
+ 		    /* Must have an associated login class. */
+@@ -1247,6 +1461,9 @@
  #ifdef HAVE_LOGIN_CAP_H
  	" [-c class|-]",
  #endif
@@ -350,22 +338,23 @@
 +#endif
  	" [-p prompt]",
  	" [-u username|#uid]",
- 	" { -e file [...] | -i | -s | <command> }",
---- sudo-1.6.8/sudo.man.in.orig	2004-08-17 20:53:39.000000000 +0200
-+++ sudo-1.6.8/sudo.man.in	2004-08-29 20:48:39.189378528 +0200
-@@ -156,7 +156,7 @@
- .IX Header "SYNOPSIS"
- \&\fBsudo\fR \fB\-K\fR | \fB\-L\fR | \fB\-V\fR | \fB\-h\fR | \fB\-k\fR | \fB\-l\fR | \fB\-v\fR
+ 	" [VAR=value]",
+--- sudo-1.6.9p3/sudo.man.in.orig	2007-08-02 17:51:59.000000000 +0200
++++ sudo-1.6.9p3/sudo.man.in	2007-08-04 22:17:59.880865627 +0200
+@@ -157,7 +157,8 @@
+ \&\fBsudo\fR \fB\-h\fR | \fB\-K\fR | \fB\-k\fR | \fB\-L\fR | \fB\-l\fR | \fB\-V\fR | \fB\-v\fR
  .PP
--\&\fBsudo\fR [\fB\-HPSb\fR] [\fB\-a\fR\ \fIauth_type\fR] [\fB\-c\fR\ \fIclass\fR|\fI\-\fR]
-+\&\fBsudo\fR [\fB\-HPSb\fR] [\fB\-a\fR\ \fIauth_type\fR] [\fB\-c\fR\ \fIclass\fR|\fI\-\fR] [\fB\-r\fR \fIrole\fR ] [\fB\-t\fR \fItype\fR ]
- [\fB\-p\fR\ \fIprompt\fR] [\fB\-u\fR\ \fIusername\fR|\fI#uid\fR]
- {\fB\-e\fR\ file\ [...]\ |\ \fB\-i\fR\ |\ \fB\-s\fR\ |\ \fIcommand\fR}
+ \&\fBsudo\fR [\fB\-bEHPS\fR] [\fB\-a\fR\ \fIauth_type\fR]
+-[\fB\-c\fR\ \fIclass\fR|\fI\-\fR] [\fB\-p\fR\ \fIprompt\fR] [\fB\-u\fR\ \fIusername\fR|\fI#uid\fR]
++[\fB\-c\fR\ \fIclass\fR|\fI\-\fR] [\fB\-r\fR \fIrole\fR ] [\fB\-t\fR \fItype\fR ]
++[\fB\-p\fR\ \fIprompt\fR] [\fB\-u\fR\ \fIusername\fR|\fI#uid\fR]
+ [\fB\s-1VAR\s0\fR=\fIvalue\fR] {\fB\-i\fR\ |\ \fB\-s\fR\ |\ \fIcommand\fR}
  .PP
-@@ -235,6 +235,16 @@
- \&\fBsudo\fR will initialize the group vector to the list of groups the
- target user is in.  The real and effective group IDs, however, are
- still set to match the target user.
+ \&\fBsudoedit\fR [\fB\-S\fR] [\fB\-a\fR\ \fIauth_type\fR] [\fB\-c\fR\ \fIclass\fR|\fI\-\fR]
+@@ -354,6 +355,16 @@
+ .RE
+ .RS 4
+ .RE
 +.IP "\-r" 4
 +.IX Item "-r"
 +The \fB\-r\fR (\fRrole\fR) option causes the new (SELinux) security context to have the role specified by
@@ -379,8 +368,8 @@
  .IP "\-S" 4
  .IX Item "-S"
  The \fB\-S\fR (\fIstdin\fR) option causes \fBsudo\fR to read the password from
---- sudo-1.6.8p1/Makefile.in.orig	2004-09-15 22:11:22.000000000 +0200
-+++ sudo-1.6.8p1/Makefile.in	2004-09-19 12:26:11.212233352 +0200
+--- sudo-1.6.9p3/Makefile.in.orig	2007-08-02 17:51:59.000000000 +0200
++++ sudo-1.6.9p3/Makefile.in	2007-08-04 22:18:17.657878682 +0200
 @@ -43,7 +43,8 @@
  # Libraries
  LIBS = @LIBS@
@@ -401,11 +390,11 @@
  #### End of system configuration section. ####
  
 @@ -104,7 +105,7 @@
-        parse.c parse.lex parse.yacc set_perms.c sigaction.c snprintf.c \
-        strcasecmp.c strerror.c strlcat.c strlcpy.c sudo.c sudo_noexec.c \
-        sudo.tab.c sudo_edit.c testsudoers.c tgetpass.c utimes.c visudo.c \
--       zero_bytes.c $(AUTH_SRCS)
-+       zero_bytes.c $(AUTH_SRCS) sesh.c
+        logging.c memrchr.c mkstemp.c parse.c parse.lex parse.yacc set_perms.c \
+        sigaction.c snprintf.c strcasecmp.c strerror.c strlcat.c strlcpy.c \
+        sudo.c sudo_noexec.c sudo.tab.c sudo_edit.c testsudoers.c tgetpass.c \
+-       utimes.c visudo.c zero_bytes.c $(AUTH_SRCS)
++       utimes.c visudo.c zero_bytes.c $(AUTH_SRCS) sesh.c
  
  AUTH_SRCS = auth/afs.c auth/aix_auth.c auth/bsdauth.c auth/dce.c auth/fwtk.c \
  	    auth/kerb4.c auth/kerb5.c auth/pam.c auth/passwd.c auth/rfc1938.c \
@@ -418,7 +407,7 @@
  TESTOBJS = interfaces.o testsudoers.o $(PARSEOBJS)
  
  LIBOBJS = @LIBOBJS@ @ALLOCA@
-@@ -145,7 +148,7 @@
+@@ -146,7 +149,7 @@
  BINFILES= BUGS CHANGES HISTORY LICENSE README TODO TROUBLESHOOTING \
  	  UPGRADE install-sh mkinstalldirs sample.syslog.conf sample.sudoers \
  	  sudo sudo.cat sudo.man sudo.pod sudoers sudoers.cat sudoers.man \
@@ -427,7 +416,7 @@
  
  BINSPECIAL= INSTALL.binary Makefile.binary libtool
  
-@@ -177,6 +180,9 @@
+@@ -178,6 +181,9 @@
  visudo: $(VISUDOBJS) $(LIBOBJS)
  	$(CC) -o $@ $(VISUDOBJS) $(LIBOBJS) $(LDFLAGS) $(LIBS) $(NET_LIBS)
  
@@ -437,7 +426,7 @@
  testsudoers: $(TESTOBJS) $(LIBOBJS)
  	$(CC) -o $@ $(TESTOBJS) $(LIBOBJS) $(LDFLAGS) $(LIBS) $(NET_LIBS)
  
-@@ -215,6 +221,7 @@
+@@ -219,6 +225,7 @@
  set_perms.o: set_perms.c $(SUDODEP)
  tgetpass.o: tgetpass.c $(SUDODEP)
  visudo.o: visudo.c $(SUDODEP) version.h
@@ -445,7 +434,7 @@
  sudo.o: sudo.c $(SUDODEP) interfaces.h version.h
  interfaces.o: interfaces.c $(SUDODEP) interfaces.h
  testsudoers.o: testsudoers.c $(SUDODEP) parse.h interfaces.h
-@@ -306,6 +313,7 @@
+@@ -314,6 +321,7 @@
  	ln $(DESTDIR)$(sudodir)/sudo $(DESTDIR)$(sudodir)/sudoedit
  
  	$(INSTALL) -O $(install_uid) -G $(install_gid) -M 0111 -s visudo $(DESTDIR)$(visudodir)/visudo
================================================================

---- CVS-web:
    http://cvs.pld-linux.org/SOURCES/sudo-ac.patch?r1=1.3&r2=1.4&f=u
    http://cvs.pld-linux.org/SOURCES/sudo-pam-login.patch?r1=1.1&r2=1.2&f=u
    http://cvs.pld-linux.org/SOURCES/sudo-selinux.patch?r1=1.4&r2=1.5&f=u



More information about the pld-cvs-commit mailing list