[sudo-workers] sudo 1.8.17b4 released

Todd C. Miller Todd.Miller at courtesan.com
Tue Jun 7 10:22:24 MDT 2016


The fourth beta release of sudo 1.8.17 is now available.  This is
primarily a bug fix release.

It would be great if someone who uses the sssd backend could give
this a go and let me know if there are any issues.

Source:
    https://www.sudo.ws/sudo/dist/beta/sudo-1.8.17b4.tar.gz
    ftp://ftp.sudo.ws/pub/sudo/beta/sudo-1.8.17b4.tar.gz

SHA256 checksum:
    03c8ed4f7bff3d5bf1c6fe466d1a43c9ee76b87aa84e042d612f964fcf90570d
MD5 checksum:
    bb36e056b819f0a67c9eefad96827d9e

Binary packages:
    https://www.sudo.ws/sudo/dist/beta/packages/index.html#binary

For a list of download mirror sites, see:
    https://www.sudo.ws/sudo/download_mirrors.html

Sudo web site:
    https://www.sudo.ws/sudo/

Sudo web site mirrors:
    https://www.sudo.ws/sudo/mirrors.html

Major changes between sudo 1.8.17b4 and 1.8.17b3:

 * Documentation fixes.

 * The sssd backend now properly handles "sudo -U otheruser -l"

 * The sssd backend now uses the value of "ipa_hostname" from
   sssd.conf, if specified.

Major changes between sudo 1.8.17b3 and 1.8.17b2:

 * Fixed a crash on glibc systems when printing an error message.

Major changes between sudo 1.8.17b2 and 1.8.17b1:

 * Forward slashes are no longer escaped in the JSON output of
   "visudo -x".  This was never required by the standard and not
   escaping them improves readability of the output.

 * Sudo no longer treats PAM_SESSION_ERR as a fatal error when
   opening the PAM session.  Other errors from pam_open_session()
   are still treated as fatal.  This avoids the "policy plugin
   failed session initialization" error message seen on some systems.

 * Korean translation for sudo and sudoers from translationproject.org.

Major changes between sudo 1.8.17b1 and 1.8.16:

 * On AIX, if /etc/security/login.cfg has auth_type set to PAM_AUTH
   but pam_start(3) fails, fall back to AIX authentication.
   Bug #740.

 * Sudo now takes all sudoers sources into account when determining
   whether or not "sudo -l" or "sudo -b" should prompt for a password.
   In other words, if both file and ldap sudoers sources are in
   specified in /etc/nsswitch.conf, "sudo -v" will now require that
   all entries in both sources be have NOPASSWD (file) or !authenticate
   (ldap) in the entries.

 * Sudo now ignores SIGPIPE until the command is executed.  Previously,
   SIGPIPE was only ignored in a few select places.  Bug #739.

 * Fixed a bug introduced in sudo 1.8.14 where (non-syslog) log
   file entries were missing the newline when loglinelen is set to
   a non-positive number.  Bug #742.

 * Unix groups are now set before the plugin session intialization
   code is run.  This makes it possible to use dynamic groups with
   the Linux-PAM pam_group module.

 * Fixed a bug where a debugging statement could dereference a NULL
   pointer when looking up a group that doesn't exist.  Bug #743.

 * Sudo has been run through the Coverity code scanner.  A number of
   minor bugs have been fixed as a result.  None were security issues.

 * SELinux support, which was broken in 1.8.16, has been repaired.

 * Fixed a bug when logging I/O where all output buffers might not
   get flushed at exit.


More information about the sudo-workers mailing list