Todd C. Miller
151e03fb5b
Instead of using stat(2) to see if the admin flag file exists and
...
creating it if not, just try to create the file and treat EEXIST
as a non-error. Coverity CID 104121.
2016-05-06 14:12:08 -06:00
Todd C. Miller
bb12328064
README file for the sample plugin that tells the user how to build,
...
install and enable it.
2016-05-06 11:30:02 -06:00
Todd C. Miller
cc82c3193e
Fix compilation error and export sample_policy struct.
...
From Michael Evans
2016-05-06 11:12:45 -06:00
Todd C. Miller
3b4f2bbfff
Update for 1.8.17
2016-05-06 09:44:52 -06:00
Todd C. Miller
3b043207b2
Sudo 1.8.17
2016-05-06 09:28:42 -06:00
Todd C. Miller
7b302e09ae
Check return value of restore_perms() in vlog_warning().
...
Coverity CID 104079.
2016-05-06 09:26:45 -06:00
Todd C. Miller
b4cb1c0a1f
Fix memory leaks in resolve_editor() in the error path.
...
Coverity CID 104109, 104110
2016-05-06 09:23:22 -06:00
Todd C. Miller
61c53c8e66
Fix memory leak of gid_list in sudoers_policy_exec_setup() in the
...
error path. Coverity CID 104111.
2016-05-06 09:17:14 -06:00
Todd C. Miller
0690793c25
Fix fd leak in do_logfile() if we fail to lock the log file.
...
Coverity CID 104115.
2016-05-06 09:12:39 -06:00
Todd C. Miller
7a5149d738
Fix memory leak of sss_result in sudo_sss_lookup()
...
Coverity CID 104106
2016-05-06 08:22:03 -06:00
Todd C. Miller
4bfdf0c2b4
Fix fd leak in open_io_fd() if gzdopen/fdopen fails.
...
Coverity CID 104105
2016-05-06 08:11:34 -06:00
Todd C. Miller
444d2a5c3e
Fix fd leak in io_nextid() in error path.
...
Coverity CID 104104
2016-05-06 08:07:40 -06:00
Todd C. Miller
562b5cb59b
Check lseek() return value.
...
Coverity CID 104061.
2016-05-05 16:46:25 -06:00
Todd C. Miller
60e740dd60
Ignore ts_write() return value when disabling an entry with a bogus
...
timestamp. We ignore the timestamp entry even it doesn't succeed.
Coverity CID 104062.
2016-05-05 16:30:11 -06:00
Todd C. Miller
6473d55aa7
Cast the return value of fcntl() to void when setting FD_CLOEXEC.
...
Coverity CID 104063, 104064, 104069, 104070, 104071, 104072, 104073, 104074
2016-05-05 16:16:24 -06:00
Todd C. Miller
9471ec45a1
Cast the return value of fcntl() to void when setting FD_CLOEXEC.
...
Coverity CID 104075, 104076, 104077.
2016-05-05 16:09:51 -06:00
Todd C. Miller
a7fa036d42
Avoid a false positive. Coverity CID 104056.
2016-05-05 15:54:06 -06:00
Todd C. Miller
c0a3c6bb9d
Avoid calling fclose(NULL) on error in export_sudoers().
...
Coverity CID 104091.
2016-05-05 15:14:57 -06:00
Todd C. Miller
a09e45d339
In fill_args(), check for "arg_size == 0" instead of
...
"sudoerslval.command.args == NULL" since the latter leads Coverity
to imply that sudoerslval.command.args could be NULL later on.
Coverity CID 104093.
2016-05-05 15:12:37 -06:00
Todd C. Miller
64142f9da2
Avoid calling fclose(NULL) if the sudoers file is not secure and
...
restore_perms() fails. Coverity CID 104090.
2016-05-05 15:01:22 -06:00
Todd C. Miller
5725acd1c4
In fill_args(), replace loop that increments arg_size() with
...
a simple add and mask. Should prevent a false positive from
Coverity CID 104094.
2016-05-04 16:59:04 -06:00
Todd C. Miller
bf734419bf
In parse_expr(), move the "bad" label after the "default" case in
...
the switch(), not before it. This seemed to confuse Covertity,
resulting in a false positive, CID 104095.
2016-05-04 16:48:02 -06:00
Todd C. Miller
ea44d3757e
For "sudoreplay -l", not all predicates may be shortened to a single
...
character. Both 'c' and 't' have more than one possibility.
2016-05-04 16:44:52 -06:00
Todd C. Miller
829917f008
pid_t is defined by POSIX as a signed integer type so we don't need
...
a cast when comparing to -1.
2016-05-04 14:14:38 -06:00
Todd C. Miller
c70da6dcdf
In dispatch_signal() for stopped processes check for tcgetpgrp()
...
returning -1. Also change checks from "saved_pgrp != -1" to
"fd != -1". Coverity CID 104098.
2016-05-04 14:13:44 -06:00
Todd C. Miller
2cd22f2906
In relabel_tty() always jump to bad: on error, regardless of the
...
value of se_state.enforcing. On error, return -1 if enforcing,
else 0. Coverity CID 104099.
2016-05-04 13:48:44 -06:00
Todd C. Miller
b20b411e71
Define NO_LEAKS when sudo is built with Coverity.
2016-05-04 13:01:57 -06:00
Todd C. Miller
4ce39df38f
In io_callback() if we write the complete buffer and find that there
...
is no associated reader just return as there is nothing else to be
done. In practice is it not possible for SUDO_EV_READ to be set
if revent is NULL but an early return is harmless and possibly
easier to understand. Coverity CID 104124.
2016-05-04 12:53:20 -06:00
Todd C. Miller
6ea903623b
Handle read() returning -1 when creating temporary files.
...
Coverity CID 104100
2016-05-04 12:48:17 -06:00
Todd C. Miller
20ff6023aa
Fix cut and paste error when checking cols for 0.
...
Coverity CID 104081
2016-05-04 11:15:20 -06:00
Todd C. Miller
2152f053b1
Use a single debug message for cache hit or store to avoid another
...
situation where they get out of sync. Bug #743
2016-05-04 09:15:12 -06:00
Todd C. Miller
a152afaeb5
Sync the "cache hit" debug messages with the "cached" debug messages.
...
This fixes a bug where we could dereference a NULL pointer when we
look up a negative cached entry which is stored as a NULL passwd
or group struct pointer. Bug #743 .
2016-05-04 08:55:21 -06:00
Todd C. Miller
9d5c6fbd64
Remove the check for __sprintf_chk when checking for _FORTIFY_SOURCE,
...
Some implementations are purely header-file based. As long as we
can link a test program using sprintf() when _FORTIFY_SOURCE=2 it
should be safe to use.
2016-04-28 15:27:53 -06:00
Todd C. Miller
e0f12d81a7
Remove configure checks for dev_t, id_t, ino_t, ptrdiff_t, size_t
...
and ssize_t. These have been specified by either ANSI C or POSIX
for long enough that if the system doesn't support them, it is
unlikely to be able to compile sudo anyway.
2016-04-28 15:09:46 -06:00
Todd C. Miller
f88da1c1a0
Do group setup in policy_init_session() before calling out to the
...
plugin. This makes it possible for the pam_group module to change
the group in pam_setcred(). It's a bit bogus since pam_setcred()
is documented as not changing the group or user ID, but pam_group
is shipped with stock Linux-PAM so we need to support it.
2016-04-28 11:01:58 -06:00
Todd C. Miller
57b1dc5e1d
Add missing newline when logging to a file (not syslog) and
...
loglinelen is set to a non-positive number. Bug #742
2016-04-26 14:39:42 -06:00
Todd C. Miller
3e9702580e
style fix; fork_cmnd should start on a new line
2016-04-25 09:58:32 -06:00
Todd C. Miller
b4309d4aea
Ignore SIGPIPE for the duration of sudo and not just in a few select
...
places. We have no control over what nss, PAM modules or sudo
plugins might do so ignoring SIGPIPE is safest.
2016-04-22 16:36:36 -06:00
Todd C. Miller
70cf5674b5
Use string_to_security_class() instead of pulling SECCLASS_CHR_FILE
...
from flask.h. Avoids a warning with new SELinux includes.
2016-04-22 11:36:08 -06:00
Todd C. Miller
6717c32022
When determining whether or not "sudo -l" or "sudo -b" should prompt
...
for a password, take all sudoers sources into account. In other
words, if both file and ldap sudoers sources are in use, "sudo -v"
will now require that all entries in both sources be have NOPASSWD
(file) or !authenticate (ldap) in the entries.
2016-04-19 10:08:51 -06:00
Todd C. Miller
b2d1c457ce
If the auth_type setting in /etc/security/login.cfg is set to
...
PAM_AUTH but pam_start() fails, fall back to use AIX authentication.
Skip the auth_type check if sudo is not compiled with PAM support.
2016-03-22 16:31:28 -06:00
Todd C. Miller
7cd6d4ec79
The header for sudo.conf(5) should be SUDO.CONF(5) not SUDO(5).
2016-03-17 10:46:23 -06:00
Todd C. Miller
c5cafb4331
hook_version and hook_type are unsigned so use 0, not -1 in the
...
final (empty) entry. Quiets a warning on Solaris Studio 12.2.
2016-03-16 10:53:43 -06:00
Todd C. Miller
48dff84081
Work around an ambiguity in the PAM spec with respect to the conversation
...
function. It is not clear whether the "struct pam_message **msg" is an
array of pointers or a pointer to an array. Linux-PAM and OpenPAM use
an array of pointers while Solaris/HP-UX/AIX uses a pointer to an array.
Bug #726 .
2016-03-09 09:39:46 -07:00
Todd C. Miller
9353672608
sync with translationproject.org
2016-03-08 10:04:46 -07:00
Todd C. Miller
f5b8ad480e
Bug #738
2016-02-27 16:56:56 -07:00
Todd C. Miller
514c62fc24
sync with translationproject.org
2016-02-26 14:39:00 -07:00
Todd C. Miller
70f2f4eee9
Better test for negated character classes.
2016-02-26 11:24:25 -07:00
Todd C. Miller
f222a20b13
Add test for negated character class
2016-02-26 11:14:50 -07:00
Todd C. Miller
159aa2ba6c
sync with translationproject.org
2016-02-26 11:02:29 -07:00