From osa@freebsd.org.ru  Mon Apr  7 02:39:13 2003
Return-Path: <osa@freebsd.org.ru>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP
	id 1D77537B401; Mon,  7 Apr 2003 02:39:13 -0700 (PDT)
Received: from freebsd.org.ru (www.freebsd.org.ru [194.84.67.5])
	by mx1.FreeBSD.org (Postfix) with ESMTP
	id BBA1243FA3; Mon,  7 Apr 2003 02:39:11 -0700 (PDT)
	(envelope-from osa@freebsd.org.ru)
Received: by freebsd.org.ru (Postfix, from userid 1000)
	id 8CE3D5D; Mon,  7 Apr 2003 13:39:09 +0400 (MSD)
Message-Id: <20030407093909.8CE3D5D@freebsd.org.ru>
Date: Mon,  7 Apr 2003 13:39:09 +0400 (MSD)
From: Sergey A.Osokin <osa@FreeBSD.org.ru>
Reply-To: Sergey A.Osokin <osa@FreeBSD.org.ru>
To: FreeBSD-gnats-submit@freebsd.org
Cc: mharo@FreeBSD.org
Subject: [PATCH] security/sudo: update from 1.6.6 to 1.6.7p3
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         50666
>Category:       ports
>Synopsis:       [PATCH] security/sudo: update from 1.6.6 to 1.6.7p3
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    mharo
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Mon Apr 07 02:40:11 PDT 2003
>Closed-Date:    Thu Apr 17 02:26:17 PDT 2003
>Last-Modified:  Thu Apr 17 02:26:17 PDT 2003
>Originator:     Sergey A. Osokin
>Release:        FreeBSD 5.0-CURRENT i386
>Organization:
n/a
>Environment:
System: FreeBSD 5.0-CURRENT #30: Mon Mar 31 15:10:23 MSD 2003 i386

>Description:
	security/sudo: update from 1.6.6 to 1.6.7p3
>How-To-Repeat:
>Fix:

Close ports/50566
Delete patch-aa
% rm ports/securty/sudo/files/patch-aa
% cvs rm ports/securty/sudo/files/patch-aa

apply following patch

Index: ports/security/sudo/Makefile
===================================================================
RCS file: /home/ncvs/ports/security/sudo/Makefile,v
retrieving revision 1.55
diff -u -r1.55 Makefile
--- ports/security/sudo/Makefile	7 Mar 2003 06:10:50 -0000	1.55
+++ ports/security/sudo/Makefile	7 Apr 2003 09:29:07 -0000
@@ -6,14 +6,14 @@
 #
 
 PORTNAME=	sudo
-PORTVERSION=	1.6.6
-PORTREVISION=	1
+PORTVERSION=	1.6.7.3
+PORTREVISION?=	0
 CATEGORIES=	security
 MASTER_SITES=	http://www.sudo.ws/sudo/dist/ \
 		ftp://ftp.cs.colorado.edu/pub/sysadmin/sudo/ \
 		ftp://ftp.stikman.com/pub/sudo/ \
 		ftp://ftp.uu.net/pub/security/sudo/
-DISTNAME=	${PORTNAME}-1.6.6
+DISTNAME=	${PORTNAME}-1.6.7p3
 
 MAINTAINER=	mharo@FreeBSD.org
 COMMENT=	Allow others to run commands as root
Index: ports/security/sudo/distinfo
===================================================================
RCS file: /home/ncvs/ports/security/sudo/distinfo,v
retrieving revision 1.34
diff -u -r1.34 distinfo
--- ports/security/sudo/distinfo	25 Apr 2002 17:20:23 -0000	1.34
+++ ports/security/sudo/distinfo	7 Apr 2003 09:29:07 -0000
@@ -1 +1 @@
-MD5 (sudo-1.6.6.tar.gz) = 4da4bf6cf31634cc7a17ec3b69fdc333
+MD5 (sudo-1.6.7p3.tar.gz) = b3ed2959489f73b81eb9e528d308dd38
Index: ports/security/sudo/files/patch-auth::pam.c
===================================================================
RCS file: /home/ncvs/ports/security/sudo/files/patch-auth::pam.c,v
retrieving revision 1.1
diff -u -r1.1 patch-auth::pam.c
--- ports/security/sudo/files/patch-auth::pam.c	13 Feb 2003 08:26:38 -0000	1.1
+++ ports/security/sudo/files/patch-auth::pam.c	7 Apr 2003 09:29:07 -0000
@@ -1,47 +1,16 @@
-Index: auth/pam.c
-===================================================================
-RCS file: /home/cvs/sudo/sudo/auth/pam.c,v
-retrieving revision 1.30
-retrieving revision 1.31
-diff -u -r1.30 -r1.31
---- auth/pam.c	22 Nov 2002 19:41:13 -0000	1.30
-+++ auth/pam.c	13 Dec 2002 16:33:26 -0000	1.31
-@@ -66,7 +66,7 @@
- #include "sudo_auth.h"
- 
- #ifndef lint
--static const char rcsid[] = "$Sudo: pam.c,v 1.29 2002/01/22 16:43:23 millert Exp $";
-+static const char rcsid[] = "$Sudo: pam.c,v 1.30 2002/11/22 19:41:13 millert Exp $";
- #endif /* lint */
- 
- static int sudo_conv __P((int, PAM_CONST struct pam_message **,
-@@ -205,7 +205,7 @@
-     PAM_CONST struct pam_message *pm;
-     const char *p = def_prompt;
-     char *pass;
--    int n;
-+    int n, flags;
-     extern int nil_pw;
- 
-     if ((*response = malloc(num_msg * sizeof(struct pam_response))) == NULL)
-@@ -213,17 +213,17 @@
-     (void) memset(*response, 0, num_msg * sizeof(struct pam_response));
- 
-     for (pr = *response, pm = *msg, n = num_msg; n--; pr++, pm++) {
-+	flags = tgetpass_flags;
- 	switch (pm->msg_style) {
- 	    case PAM_PROMPT_ECHO_ON:
--		tgetpass_flags |= TGP_ECHO;
-+		flags |= TGP_ECHO;
- 	    case PAM_PROMPT_ECHO_OFF:
- 		/* Only override PAM prompt if it matches /^Password: ?/ */
- 		if (strncmp(pm->msg, "Password:", 9) || (pm->msg[9] != '\0'
- 		    && (pm->msg[9] != ' ' || pm->msg[10] != '\0')))
+--- auth/pam.c.orig	Wed Apr  2 11:55:50 2003
++++ auth/pam.c	Wed Apr  2 11:57:32 2003
+@@ -224,11 +224,11 @@
  		    p = pm->msg;
  		/* Read the password. */
--		pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60,
--		    tgetpass_flags);
-+		pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60, flags);
- 		pr->resp = estrdup(pass ? pass : "");
+ 		pass = tgetpass(p, def_ival(I_PASSWD_TIMEOUT) * 60, flags);
+-		pr->resp = estrdup(pass ? pass : "");
++		pr->resp = estrdup((const char *)pass ? (const char *)pass : "");
  		if (*pr->resp == '\0')
  		    nil_pw = 1;		/* empty password */
+ 		else
+-		    memset(pass, 0, strlen(pass));
++		    memset((void *)pass, 0, strlen((const char *)pass));
+ 		break;
+ 	    case PAM_TEXT_INFO:
+ 		if (pm->msg)
>Release-Note:
>Audit-Trail:
Responsible-Changed-From-To: freebsd-ports-bugs->mharo 
Responsible-Changed-By: leeym 
Responsible-Changed-When: Mon Apr 7 11:31:53 PDT 2003 
Responsible-Changed-Why:  
Over to the maintainer. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=50666 
State-Changed-From-To: open->closed 
State-Changed-By: fjoe 
State-Changed-When: Thu Apr 17 02:25:43 PDT 2003 
State-Changed-Why:  
Superceded by PR 51084 

http://www.freebsd.org/cgi/query-pr.cgi?pr=50666 
>Unformatted:
