summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/sudo/sudo_1.9.17p1.bb
diff options
context:
space:
mode:
authorPraveen Kumar <praveen.kumar@windriver.com>2025-07-09 11:36:34 +0530
committerRichard Purdie <richard.purdie@linuxfoundation.org>2025-07-10 10:47:31 +0100
commit8f27a8f156265d6b89eb4d77ebedf776681899b2 (patch)
tree8f207d37d8ddd7fbc965179419a731cd0720daed /meta/recipes-extended/sudo/sudo_1.9.17p1.bb
parentb92f52ef2737e7cc9a0f56b5d7de6f413e134823 (diff)
downloadpoky-8f27a8f156265d6b89eb4d77ebedf776681899b2.tar.gz
sudo: upgrade 1.9.17 -> 1.9.17p1
Changelog: =========== * Fixed CVE-2025-32462. Sudo's -h (--host) option could be specified when running a command or editing a file. This could enable a local privilege escalation attack if the sudoers file allows the user to run commands on a different host. * Fixed CVE-2025-32463. An attacker can leverage sudo's -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file. The chroot support has been deprecated an will be removed entirely in a future release. (From OE-Core rev: 4ac42eefe6c1b5895a3334d7f90004fdc8a3267f) Signed-off-by: Praveen Kumar <praveen.kumar@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/sudo/sudo_1.9.17p1.bb')
-rw-r--r--meta/recipes-extended/sudo/sudo_1.9.17p1.bb61
1 files changed, 61 insertions, 0 deletions
diff --git a/meta/recipes-extended/sudo/sudo_1.9.17p1.bb b/meta/recipes-extended/sudo/sudo_1.9.17p1.bb
new file mode 100644
index 0000000000..83bfc0621c
--- /dev/null
+++ b/meta/recipes-extended/sudo/sudo_1.9.17p1.bb
@@ -0,0 +1,61 @@
1require sudo.inc
2
3SRC_URI = "https://www.sudo.ws/dist/sudo-${PV}.tar.gz \
4 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
5 file://0001-sudo.conf.in-fix-conflict-with-multilib.patch \
6 "
7
8PAM_SRC_URI = "file://sudo.pam"
9
10SRC_URI[sha256sum] = "ff607ea717072197738a78f778692cd6df9a7e3e404565f51de063ca27455d32"
11
12DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
13RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-keyinit', '', d)}"
14
15CACHED_CONFIGUREVARS = " \
16 ac_cv_type_rsize_t=no \
17 ac_cv_path_MVPROG=${base_bindir}/mv \
18 ac_cv_path_BSHELLPROG=${base_bindir}/sh \
19 ac_cv_path_SENDMAILPROG=${sbindir}/sendmail \
20 ac_cv_path_VIPROG=${base_bindir}/vi \
21 "
22
23EXTRA_OECONF += " \
24 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \
25 ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '--enable-tmpfiles.d=${nonarch_libdir}/tmpfiles.d', '--disable-tmpfiles.d', d)} \
26 --with-rundir=/run/sudo \
27 --with-vardir=/var/lib/sudo \
28 --libexecdir=${libdir} \
29 "
30
31do_install:append () {
32 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then
33 install -D -m 644 ${UNPACKDIR}/sudo.pam ${D}/${sysconfdir}/pam.d/sudo
34 if ${@bb.utils.contains('PACKAGECONFIG', 'pam-wheel', 'true', 'false', d)} ; then
35 echo 'auth required pam_wheel.so use_uid' >>${D}${sysconfdir}/pam.d/sudo
36 sed -i 's/# \(%wheel ALL=(ALL) ALL\)/\1/' ${D}${sysconfdir}/sudoers
37 fi
38 fi
39
40 chmod 4111 ${D}${bindir}/sudo
41 chmod 0440 ${D}${sysconfdir}/sudoers
42
43 # Explicitly remove the /sudo directory to avoid QA error
44 rmdir -p --ignore-fail-on-non-empty ${D}/run/sudo
45}
46
47FILES:${PN}-dev += "${libdir}/${BPN}/lib*${SOLIBSDEV} ${libdir}/${BPN}/*.la \
48 ${libdir}/lib*${SOLIBSDEV} ${libdir}/*.la"
49
50CONFFILES:${PN}-lib = "${sysconfdir}/sudoers"
51
52SUDO_PACKAGES = "${PN}-sudo\
53 ${PN}-lib"
54
55PACKAGE_BEFORE_PN = "${SUDO_PACKAGES}"
56
57RDEPENDS:${PN}-sudo = "${PN}-lib"
58RDEPENDS:${PN} += "${SUDO_PACKAGES}"
59
60FILES:${PN}-sudo = "${bindir}/sudo ${bindir}/sudoedit"
61FILES:${PN}-lib = "${localstatedir} ${libexecdir} ${sysconfdir} ${libdir} ${nonarch_libdir}"