From 2f417910d0794e5687990d5489970f8e2a626fc7 Mon Sep 17 00:00:00 2001 From: "Todd C. Miller" Date: Thu, 30 Mar 1995 04:49:03 +0000 Subject: [PATCH] updated --- CHANGES | 18 ++++++++++++++++++ SUPPORTED | 3 ++- TODO | 36 +++++++----------------------------- TROUBLESHOOTING | 4 ++-- 4 files changed, 29 insertions(+), 32 deletions(-) diff --git a/CHANGES b/CHANGES index 84494d1b7..94e65ee92 100644 --- a/CHANGES +++ b/CHANGES @@ -251,3 +251,21 @@ CHANGES from sudo 1.3.1pl4 85) Converted configure.in and acsite.m4 to autoconf 2.1. 86) Added lsearch.c and search.h for os's w/o lsearch()/lfind(). + +87) Fixed a problem on HP-UX trusted systems with getpwuid() returning "*" + unless the real uid is 0. Reported by Brian Cunnie (cunnie@nyc.hp.com). + +88) configure now checks for size_t and ssize_t in unistd.h as well + as sys/types.h. + +89) configure now checks for egrep before actually using it. + +90) Added support for SunOS 4.x C2 security (shadow passwords) from + Kendall Libby (fubar@shore.net) + +91) Changed all occurences of bzero() to memset() and bcopy() to + memmove(). + +92) Fixed a bug in sudo.c. If a user has no passwd entry sudo would + dump core (writing to a garbage pointer). Pointed out by + Stephen Schaefer . diff --git a/SUPPORTED b/SUPPORTED index b9292f438..8459c6bc6 100644 --- a/SUPPORTED +++ b/SUPPORTED @@ -13,6 +13,7 @@ KSR OS Linux (shadow password support untested) NextStep 2.x and 3.x DEC OSF/1 1.x and 2.0 (w/ or w/o enhanced security, see INSTALL) -SunOS 3.5 and 4.x +SunOS 3.5 +SunOS 4.x (w/ or w/o enhanced security, see INSTALL) Solaris 2.x Ultrix 4.x (w/ or w/o enhanced security, see INSTALL) diff --git a/TODO b/TODO index 2a0bb8639..d1f0afeec 100644 --- a/TODO +++ b/TODO @@ -11,38 +11,16 @@ TODO list 05) Add default options to sudoers file (umask, def uid, def gids, dir, PATH). -06) Add a whatnow-style prompt to visudo. +06) Add a SHELLS reserved word that checks against /etc/shells. -07) Add a SHELLS reserved word that checks against /etc/shells. +07) Make the sudoers file accessible via NIS, Hesiod, and maybe NetInfo. -08) Make the sudoers file accessible via NIS, Hesiod, and maybe NetInfo. +08) Add a %h field to MAILSUBJECT for the hostname. -09) Add a %h field to MAILSUBJECT for the hostname. +09) Add a -h flag to sudo for a history mechanism. -10) Add a -h flag to sudo for a history mechanism. +10) Fully integrate riscos and isc support -11) Fully integrate riscos and isc support +11) Make parse.lex in the same coding style as everything else... -12) Make parse.lex in the same coding style as everything else... - -13) Fix the logging that happens when there is a sudoers parse error. - "error in /etc/sudoers ; PWD=/usr/local/src/millert/sudo.v1.3.1 ; command:" - and make sure it sends informative mail to root. - -16) Sudo.log should go in /var/log if it exists... - -17) configure should check for egrep before blindly using it - -18) reorder options.h and OPTIONS - -19) configure should check for type stuff in unistd.h as well - -20) write visudo.man - -21) fix testsudoers - -22) Test setting SUDOERS_OWNER to non-root and try sudo & visudo - -23) New copyright for parse.* - -24) Make -l work in sudo. +12) Make -l work in sudo. diff --git a/TROUBLESHOOTING b/TROUBLESHOOTING index 75d15027d..81084f6aa 100644 --- a/TROUBLESHOOTING +++ b/TROUBLESHOOTING @@ -1,7 +1,7 @@ Troubleshooting tips for CU sudo. -Q) Sudo compiles but when I run it I get "setuid(0): Not owner" and sudo - quits. +Q) Sudo compiles but when I run it I get "Sorry, sudo must be setuid root." + and sudo quits. A) Sudo must be setuid root to do its work. You need to do something like "chmod 4111 /usr/local/bin/sudo". -- 2.40.0