summaryrefslogtreecommitdiff
path: root/system
diff options
context:
space:
mode:
Diffstat (limited to 'system')
-rw-r--r--system/sudo/APKBUILD26
-rw-r--r--system/sudo/CVE-2021-3156.patch165
-rw-r--r--system/sudo/SIGUNUSED.patch16
-rw-r--r--system/sudo/fix-cross-compile.patch15
-rw-r--r--system/sudo/musl-fix-headers.patch10
5 files changed, 8 insertions, 224 deletions
diff --git a/system/sudo/APKBUILD b/system/sudo/APKBUILD
index 1305a61f3..6aa3c4bf3 100644
--- a/system/sudo/APKBUILD
+++ b/system/sudo/APKBUILD
@@ -3,13 +3,13 @@
# Contributor: Natanael Copa <ncopa@alpinelinux.org>
# Maintainer: Horst Burkhardt <horst@adelielinux.org>
pkgname=sudo
-pkgver=1.9.2
+pkgver=1.9.9
if [ "${pkgver%_*}" != "$pkgver" ]; then
_realver=${pkgver%_*}${pkgver#*_}
else
_realver=$pkgver
fi
-pkgrel=2
+pkgrel=0
pkgdesc="Give certain users the ability to run some commands as root"
url="https://www.sudo.ws/sudo/"
arch="all"
@@ -20,12 +20,7 @@ makedepends_host="linux-pam-dev zlib-dev utmps-dev"
makedepends_build="bash"
makedepends="$makedepends_host $makedepends_build"
subpackages="$pkgname-doc $pkgname-dev $pkgname-lang"
-source="https://www.sudo.ws/dist/sudo-${_realver}.tar.gz
- fix-cross-compile.patch
- musl-fix-headers.patch
- SIGUNUSED.patch
- CVE-2021-3156.patch
- "
+source="https://www.sudo.ws/dist/sudo-${_realver}.tar.gz"
builddir="$srcdir"/$pkgname-$_realver
somask="audit_json.so
group_file.so
@@ -37,6 +32,10 @@ somask="audit_json.so
"
# secfixes:
+# 1.9.9-r0:
+# - CVE-2021-3156
+# - CVE-2021-23239
+# - CVE-2021-23240
# 1.8.20_p2-r0:
# - CVE-2017-1000368
# 1.8.28-r0:
@@ -64,11 +63,6 @@ build() {
--disable-log-server \
--disable-log-client \
--with-secure-path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
-
- # Workaround until SIGUNUSED.patch is not needed anymore
- rm lib/util/mksiglist.h lib/util/mksigname.h
- make -C lib/util DEVEL=1 mksiglist.h mksigname.h
-
make
}
@@ -84,8 +78,4 @@ package() {
rm -rf "$pkgdir"/var/run
}
-sha512sums="20afdf2604b1c93395157382b24f225cd1ff88d3a892362e2d69fecd240c4e7171f05032c08be1778cd1dea6e460025e4241f57272fac0ea3550e220b6d73d21 sudo-1.9.2.tar.gz
-f0f462f40502da2194310fe4a72ec1a16ba40f95a821ba9aa6aabaa423d28c4ab26b684afa7fb81c2407cf60de9327bdab01de51b878c5d4de49b0d62645f53c fix-cross-compile.patch
-dcc03abdd672c934f90dfd3683b3f81a8d39cfff91307d2dbd20a31a852022ab605d034c4fe11860ba99b78d391a9812fca1d6e052620b8ff2c42e4f0c7a1a62 musl-fix-headers.patch
-2733c220ccbdaf61a32d8c72a5bc0209673733014f0d71b568f1523b71416e9d1754dd8c95bc6cd99aa7f935ed6e93c5f19b1a1dbb7dfc2daf9917fd37f96e78 SIGUNUSED.patch
-7ef329edccbbd26ac55ff58d4c6c470bf2d829ff8ad1388d67b6ea8c2c8284fd362209cf11458787efaa4e301106bd3b49b8b7310c9d222ac3a3483a17b3ec0e CVE-2021-3156.patch"
+sha512sums="53064240431ae3d9409dc5cb7d72ab55d9ab5f802af4de99fadd987855461b3cca53f261d6256e3b6f35e30c7e162f4dfa3978ef6976415cf5be874fb2026614 sudo-1.9.9.tar.gz"
diff --git a/system/sudo/CVE-2021-3156.patch b/system/sudo/CVE-2021-3156.patch
deleted file mode 100644
index 7cb492d61..000000000
--- a/system/sudo/CVE-2021-3156.patch
+++ /dev/null
@@ -1,165 +0,0 @@
-
-# HG changeset patch
-# User Todd C. Miller <Todd.Miller@sudo.ws>
-# Date 1611416639 25200
-# Node ID 049ad90590be1e5dfb7df2675d2eb3e37c96ab86
-# Parent a97dc92eae6b60ae285055441341d493c17262ff
-Fix potential buffer overflow when unescaping backslashes in user_args.
-Also, do not try to unescaping backslashes unless in run mode *and*
-we are running the command via a shell.
-Found by Qualys, this fixes CVE-2021-3156.
-
-diff -r a97dc92eae6b -r 049ad90590be plugins/sudoers/sudoers.c
---- a/plugins/sudoers/sudoers.c Sat Jan 23 08:43:59 2021 -0700
-+++ b/plugins/sudoers/sudoers.c Sat Jan 23 08:43:59 2021 -0700
-@@ -547,7 +547,7 @@
-
- /* If run as root with SUDO_USER set, set sudo_user.pw to that user. */
- /* XXX - causes confusion when root is not listed in sudoers */
-- if (sudo_mode & (MODE_RUN | MODE_EDIT) && prev_user != NULL) {
-+ if (ISSET(sudo_mode, MODE_RUN|MODE_EDIT) && prev_user != NULL) {
- if (user_uid == 0 && strcmp(prev_user, "root") != 0) {
- struct passwd *pw;
-
-@@ -932,8 +932,8 @@
- if (user_cmnd == NULL)
- user_cmnd = NewArgv[0];
-
-- if (sudo_mode & (MODE_RUN | MODE_EDIT | MODE_CHECK)) {
-- if (ISSET(sudo_mode, MODE_RUN | MODE_CHECK)) {
-+ if (ISSET(sudo_mode, MODE_RUN|MODE_EDIT|MODE_CHECK)) {
-+ if (!ISSET(sudo_mode, MODE_EDIT)) {
- if (def_secure_path && !user_is_exempt())
- path = def_secure_path;
- if (!set_perms(PERM_RUNAS))
-@@ -961,7 +961,8 @@
- sudo_warnx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
- debug_return_int(NOT_FOUND_ERROR);
- }
-- if (ISSET(sudo_mode, MODE_SHELL|MODE_LOGIN_SHELL)) {
-+ if (ISSET(sudo_mode, MODE_SHELL|MODE_LOGIN_SHELL) &&
-+ ISSET(sudo_mode, MODE_RUN)) {
- /*
- * When running a command via a shell, the sudo front-end
- * escapes potential meta chars. We unescape non-spaces
-@@ -969,10 +970,22 @@
- */
- for (to = user_args, av = NewArgv + 1; (from = *av); av++) {
- while (*from) {
-- if (from[0] == '\\' && !isspace((unsigned char)from[1]))
-+ if (from[0] == '\\' && from[1] != '\0' &&
-+ !isspace((unsigned char)from[1])) {
- from++;
-+ }
-+ if (size - (to - user_args) < 1) {
-+ sudo_warnx(U_("internal error, %s overflow"),
-+ __func__);
-+ debug_return_int(NOT_FOUND_ERROR);
-+ }
- *to++ = *from++;
- }
-+ if (size - (to - user_args) < 1) {
-+ sudo_warnx(U_("internal error, %s overflow"),
-+ __func__);
-+ debug_return_int(NOT_FOUND_ERROR);
-+ }
- *to++ = ' ';
- }
- *--to = '\0';
-
-
-# HG changeset patch
-# User Todd C. Miller <Todd.Miller@sudo.ws>
-# Date 1611416639 25200
-# Node ID 9b97f1787804aedccaec63c379053b1a91a0e409
-# Parent 90aba6ba6e03f3bc33b4eabf16358396ed83642d
-Reset valid_flags to MODE_NONINTERACTIVE for sudoedit.
-This is consistent with how the -e option is handled.
-Also reject -H and -P flags for sudoedit as was done in sudo 1.7.
-Found by Qualys, this is part of the fix for CVE-2021-3156.
-
-diff -r 90aba6ba6e03 -r 9b97f1787804 src/parse_args.c
---- a/src/parse_args.c Mon Jan 18 12:30:52 2021 +0100
-+++ b/src/parse_args.c Sat Jan 23 08:43:59 2021 -0700
-@@ -117,7 +117,10 @@
- /*
- * Default flags allowed when running a command.
- */
--#define DEFAULT_VALID_FLAGS (MODE_BACKGROUND|MODE_PRESERVE_ENV|MODE_RESET_HOME|MODE_LOGIN_SHELL|MODE_NONINTERACTIVE|MODE_SHELL)
-+#define DEFAULT_VALID_FLAGS (MODE_BACKGROUND|MODE_PRESERVE_ENV|MODE_RESET_HOME|MODE_LOGIN_SHELL|MODE_NONINTERACTIVE|MODE_PRESERVE_GROUPS|MODE_SHELL)
-+#define EDIT_VALID_FLAGS MODE_NONINTERACTIVE
-+#define LIST_VALID_FLAGS (MODE_NONINTERACTIVE|MODE_LONG_LIST)
-+#define VALIDATE_VALID_FLAGS MODE_NONINTERACTIVE
-
- /* Option number for the --host long option due to ambiguity of the -h flag. */
- #define OPT_HOSTNAME 256
-@@ -262,6 +265,7 @@
- progname = "sudoedit";
- mode = MODE_EDIT;
- sudo_settings[ARG_SUDOEDIT].value = "true";
-+ valid_flags = EDIT_VALID_FLAGS;
- }
-
- /* Load local IP addresses and masks. */
-@@ -365,7 +369,7 @@
- usage_excl();
- mode = MODE_EDIT;
- sudo_settings[ARG_SUDOEDIT].value = "true";
-- valid_flags = MODE_NONINTERACTIVE;
-+ valid_flags = EDIT_VALID_FLAGS;
- break;
- case 'g':
- assert(optarg != NULL);
-@@ -377,6 +381,7 @@
- break;
- case 'H':
- sudo_settings[ARG_SET_HOME].value = "true";
-+ SET(flags, MODE_RESET_HOME);
- break;
- case 'h':
- if (optarg == NULL) {
-@@ -431,7 +436,7 @@
- usage_excl();
- }
- mode = MODE_LIST;
-- valid_flags = MODE_NONINTERACTIVE|MODE_LONG_LIST;
-+ valid_flags = LIST_VALID_FLAGS;
- break;
- case 'n':
- SET(flags, MODE_NONINTERACTIVE);
-@@ -439,6 +444,7 @@
- break;
- case 'P':
- sudo_settings[ARG_PRESERVE_GROUPS].value = "true";
-+ SET(flags, MODE_PRESERVE_GROUPS);
- break;
- case 'p':
- /* An empty prompt is allowed. */
-@@ -505,7 +511,7 @@
- if (mode && mode != MODE_VALIDATE)
- usage_excl();
- mode = MODE_VALIDATE;
-- valid_flags = MODE_NONINTERACTIVE;
-+ valid_flags = VALIDATE_VALID_FLAGS;
- break;
- case 'V':
- if (mode && mode != MODE_VERSION)
-@@ -533,7 +539,7 @@
- if (!mode) {
- /* Defer -k mode setting until we know whether it is a flag or not */
- if (sudo_settings[ARG_IGNORE_TICKET].value != NULL) {
-- if (argc == 0 && !(flags & (MODE_SHELL|MODE_LOGIN_SHELL))) {
-+ if (argc == 0 && !ISSET(flags, MODE_SHELL|MODE_LOGIN_SHELL)) {
- mode = MODE_INVALIDATE; /* -k by itself */
- sudo_settings[ARG_IGNORE_TICKET].value = NULL;
- valid_flags = 0;
-@@ -601,7 +607,7 @@
- /*
- * For shell mode we need to rewrite argv
- */
-- if (ISSET(mode, MODE_RUN) && ISSET(flags, MODE_SHELL)) {
-+ if (ISSET(flags, MODE_SHELL|MODE_LOGIN_SHELL) && ISSET(mode, MODE_RUN)) {
- char **av, *cmnd = NULL;
- int ac = 1;
-
-
diff --git a/system/sudo/SIGUNUSED.patch b/system/sudo/SIGUNUSED.patch
deleted file mode 100644
index 969c3e82d..000000000
--- a/system/sudo/SIGUNUSED.patch
+++ /dev/null
@@ -1,16 +0,0 @@
---- sudo-1.8.28/lib/util/siglist.in 2019-10-10 11:32:54.000000000 -0500
-+++ sudo-1.8.28/lib/util/siglist.in 2019-10-14 16:42:46.259938722 -0500
-@@ -17,11 +17,12 @@
- EMT EMT trap
- FPE Floating point exception
- KILL Killed
-+# before UNUSED (musl defines them as the same number)
-+ SYS Bad system call
- # before BUS (Older Linux doesn't really have a BUS, but defines it to UNUSED)
- UNUSED Unused
- BUS Bus error
- SEGV Memory fault
-- SYS Bad system call
- PIPE Broken pipe
- ALRM Alarm clock
- TERM Terminated
diff --git a/system/sudo/fix-cross-compile.patch b/system/sudo/fix-cross-compile.patch
deleted file mode 100644
index d2fc97cca..000000000
--- a/system/sudo/fix-cross-compile.patch
+++ /dev/null
@@ -1,15 +0,0 @@
---- ./lib/util/Makefile.in.orig
-+++ ./lib/util/Makefile.in
-@@ -160,10 +160,10 @@
- ./mksigname > $@
-
- mksiglist: $(srcdir)/mksiglist.c $(srcdir)/mksiglist.h $(incdir)/sudo_compat.h $(top_builddir)/config.h
-- $(CC) $(CPPFLAGS) $(CFLAGS) $(srcdir)/mksiglist.c -o $@
-+ $${HOSTCC:-gcc} $(CPPFLAGS) $(CFLAGS) $(srcdir)/mksiglist.c -o $@
-
- mksigname: $(srcdir)/mksigname.c $(srcdir)/mksigname.h $(incdir)/sudo_compat.h $(top_builddir)/config.h
-- $(CC) $(CPPFLAGS) $(CFLAGS) $(srcdir)/mksigname.c -o $@
-+ $${HOSTCC:-gcc} $(CPPFLAGS) $(CFLAGS) $(srcdir)/mksigname.c -o $@
-
- $(srcdir)/mksiglist.h: $(srcdir)/siglist.in
- @if [ -n "$(DEVEL)" ]; then \
diff --git a/system/sudo/musl-fix-headers.patch b/system/sudo/musl-fix-headers.patch
deleted file mode 100644
index d57a9ff4b..000000000
--- a/system/sudo/musl-fix-headers.patch
+++ /dev/null
@@ -1,10 +0,0 @@
---- ./include/sudo_compat.h.orig
-+++ ./include/sudo_compat.h
-@@ -25,6 +25,7 @@
- #endif
- #if !defined(HAVE_MEMSET_S) && !defined(rsize_t)
- # include <stddef.h> /* for rsize_t */
-+#include <sys/types.h> /* for id_t */
- # ifdef HAVE_STRING_H
- # include <string.h> /* for rsize_t on AIX */
- # endif /* HAVE_STRING_H */