Change log for sudo package in Ubuntu

76150 of 209 results
Superseded in xenial-updates
Deleted in xenial-proposed (Reason: moved to -updates)
sudo (1.8.16-0ubuntu1.2) xenial; urgency=medium

  * debian/sudoers:
    - include /snap/bin in the secure_path (LP: #1595558)

 -- Michael Vogt <email address hidden>  Mon, 15 Aug 2016 18:10:18 +0200
Superseded in zesty-release
Obsolete in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
sudo (1.8.16-0ubuntu3) yakkety; urgency=medium

  * debian/sudoers:
    - include /snap/bin in the secure_path (LP: #1595558)

 -- Michael Vogt <email address hidden>  Mon, 15 Aug 2016 18:08:34 +0200

Available diffs

Superseded in xenial-updates
Deleted in xenial-proposed (Reason: moved to -updates)
sudo (1.8.16-0ubuntu1.1) xenial; urgency=medium

  * debian/patches/lp1565567.patch: fix crash when looking up a negative
    cached entry which is stored as a NULL passwd or group struct pointer
    in plugins/sudoers/pwutil.c. (LP: #1565567)

 -- Marc Deslauriers <email address hidden>  Wed, 04 May 2016 11:36:54 -0400
Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
sudo (1.8.16-0ubuntu2) yakkety; urgency=medium

  * debian/patches/lp1565567.patch: fix crash when looking up a negative
    cached entry which is stored as a NULL passwd or group struct pointer
    in plugins/sudoers/pwutil.c. (LP: #1565567)

 -- Marc Deslauriers <email address hidden>  Wed, 04 May 2016 11:31:55 -0400
Superseded in yakkety-release
Published in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
sudo (1.8.16-0ubuntu1) xenial; urgency=medium

  * Update to new upstream version 1.8.16. (LP: #1563825)
    - Dropped patches no longer needed:
      + CVE-2015-5602-6.patch
      + CVE-2015-5602-7.patch
  * Merge from Debian unstable. Remaining changes:
    - Use tmpfs location to store timestamp files
      + debian/rules: change --with-rundir to /var/run/sudo
      + debian/rules, debian/sudo.service, debian/sudo.sudo.init: stop
        shipping init script and service file, as they are no longer
        necessary.
      + debian/*.preinst, debian/*.postinst, debian/*.postrm: remove old
        init script with dpkg-maintscript-helper.
      + debian/*.postinst: remove old /var/run/sudo to /var/lib/sudo
        transition code, remove old /var/lib/sudo/ts timestamp directory.
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets --enable-admin-flag
      + install man/man8/sudo_root.8 in both flavours
      + install apport hooks
    - debian/sudoers:
      + also grant admin group sudo access
    - debian/source_sudo.py, debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
    - debian/sudo.pam:
      + Use pam_env to read /etc/environment and /etc/default/locale
        environment files. Reading ~/.pam_environment is not permitted due to
        security reasons.
    - debian/control:
      + dh-autoreconf dependency fixes missing-build-dependency-for-dh_-command
    - Remaining patches:
      + keep_home_by_default.patch: Keep HOME in the default environment
      + debian/patches/also_check_sudo_group.diff: also check the sudo group
        in plugins/sudoers/sudoers.c to create the admin flag file. Leave the
        admin group check for backwards compatibility.
    - Dropped patches no longer needed:
      + debian/patches/pam_check_untranslated_prompt.patch: upstream.

Available diffs

Superseded in xenial-release
Obsolete in wily-release
Deleted in wily-proposed (Reason: moved to release)
sudo (1.8.12-1ubuntu3) wily; urgency=medium

  * debian/patches/pam_check_untranslated_prompt.patch: also check the un-
    translated version of the prompt when checking if the PAM prompt matches
    "Password:". Patch from Joel Pelaez Jorge. (LP: #1414303)

 -- Mathieu Trudel-Lapierre <email address hidden>  Tue, 22 Sep 2015 11:57:43 -0400
Superseded in trusty-updates
Deleted in trusty-proposed (Reason: moved to -updates)
sudo (1.8.9p5-1ubuntu1.2) trusty-proposed; urgency=medium

  * Ensure uid matching works in the sudoers file. (LP: #1319403)

 -- Brian Murray <email address hidden>  Wed, 26 Aug 2015 16:59:47 -0700
Superseded in wily-release
Deleted in wily-proposed (Reason: moved to release)
sudo (1.8.12-1ubuntu2) wily; urgency=medium

  * Use tmpfs location to store timestamp files (LP: #1458031)
    - debian/rules: change --with-rundir to /var/run/sudo
    - debian/rules, debian/sudo.service, debian/sudo.sudo.init: stop
      shipping init script and service file, as they are no longer
      necessary.
    - debian/*.preinst, debian/*.postinst, debian/*.postrm: remove old init
      script with dpkg-maintscript-helper.
    - debian/*.postinst: remove old /var/run/sudo to /var/lib/sudo
      transition code, remove old /var/lib/sudo/ts timestamp directory.

 -- Marc Deslauriers <email address hidden>  Fri, 05 Jun 2015 09:31:38 -0400
Superseded in wily-release
Deleted in wily-proposed (Reason: moved to release)
sudo (1.8.12-1ubuntu1) wily; urgency=medium

  * Merge from Debian unstable. (LP: #1451274, LP: #1219337)
    Remaining changes:
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets --enable-admin-flag
      + install man/man8/sudo_root.8 in both flavours
      + install apport hooks
    - debian/sudoers:
      + also grant admin group sudo access
    - debian/source_sudo.py, debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
    - debian/sudo.pam:
      + Use pam_env to read /etc/environment and /etc/default/locale
        environment files. Reading ~/.pam_environment is not permitted due to
        security reasons.
    - debian/control:
      + dh-autoreconf dependency fixes missing-build-dependency-for-dh_-command
    - Remaining patches:
      + keep_home_by_default.patch: Keep HOME in the default environment
      + debian/patches/also_check_sudo_group.diff: also check the sudo group
        in plugins/sudoers/sudoers.c to create the admin flag file. Leave the
        admin group check for backwards compatibility.
  * Dropped patches no longer needed:
      + add_probe_interfaces_setting.diff
      + actually-use-buildflags.diff
      + CVE-2014-9680.patch

Obsolete in lucid-updates
Obsolete in lucid-security
sudo (1.7.2p1-1ubuntu5.8) lucid-security; urgency=medium

  * SECURITY UPDATE: arbitrary file access via TZ
    - configure, configure.in, doc/sudoers.cat, doc/sudoers.man.in,
      pathnames.h.in, plugins/sudoers/env.c: sanity check TZ env variable.
    - http://www.sudo.ws/repos/sudo/rev/650ac6938b59
    - http://www.sudo.ws/repos/sudo/rev/ac1467f71ac0
    - http://www.sudo.ws/repos/sudo/rev/91859f613b88
    - http://www.sudo.ws/repos/sudo/rev/579b02f0dbe0
    - CVE-2014-9680
 -- Marc Deslauriers <email address hidden>   Thu, 12 Mar 2015 12:21:20 -0400
Superseded in precise-updates
Superseded in precise-security
sudo (1.8.3p1-1ubuntu3.7) precise-security; urgency=medium

  * SECURITY UPDATE: arbitrary file access via TZ
    - debian/patches/CVE-2014-9680.patch: sanity check TZ env variable in
      configure, configure.in, doc/sudoers.cat, doc/sudoers.man.in,
      pathnames.h.in, plugins/sudoers/env.c.
    - CVE-2014-9680
 -- Marc Deslauriers <email address hidden>   Thu, 12 Mar 2015 11:32:42 -0400
Obsolete in utopic-updates
Obsolete in utopic-security
sudo (1.8.9p5-1ubuntu2.1) utopic-security; urgency=medium

  * SECURITY UPDATE: arbitrary file access via TZ
    - debian/patches/CVE-2014-9680.patch: sanity check TZ env variable in
      configure, configure.ac, doc/sudoers.cat, doc/sudoers.man.in,
      doc/sudoers.mdoc.in, m4/sudo.m4, pathnames.h.in,
      plugins/sudoers/env.c.
    - CVE-2014-9680
 -- Marc Deslauriers <email address hidden>   Thu, 12 Mar 2015 11:20:35 -0400
Superseded in trusty-updates
Superseded in trusty-security
sudo (1.8.9p5-1ubuntu1.1) trusty-security; urgency=medium

  * SECURITY UPDATE: arbitrary file access via TZ
    - debian/patches/CVE-2014-9680.patch: sanity check TZ env variable in
      configure, configure.ac, doc/sudoers.cat, doc/sudoers.man.in,
      doc/sudoers.mdoc.in, m4/sudo.m4, pathnames.h.in,
      plugins/sudoers/env.c.
    - CVE-2014-9680
 -- Marc Deslauriers <email address hidden>   Thu, 12 Mar 2015 11:21:06 -0400
Superseded in wily-release
Obsolete in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
sudo (1.8.9p5-1ubuntu5) vivid; urgency=medium

  * SECURITY UPDATE: arbitrary file access via TZ
    - debian/patches/CVE-2014-9680.patch: sanity check TZ env variable in
      configure, configure.ac, doc/sudoers.cat, doc/sudoers.man.in,
      doc/sudoers.mdoc.in, m4/sudo.m4, pathnames.h.in,
      plugins/sudoers/env.c.
    - CVE-2014-9680
 -- Marc Deslauriers <email address hidden>   Thu, 12 Mar 2015 10:45:21 -0400
Superseded in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
sudo (1.8.9p5-1ubuntu4) vivid; urgency=medium

  * Correct sudo.pam use "session" for pam_env.so, not "auth". (LP:
    #155794, LP: #25700)
 -- Dimitri John Ledkov <email address hidden>   Tue, 23 Dec 2014 04:08:33 +0000
Superseded in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
sudo (1.8.9p5-1ubuntu3) vivid; urgency=medium

  * debian/patches/also_check_sudo_group.diff: also check the sudo group
    in plugins/sudoers/sudoers.c to create the admin flag file. Leave the
    admin group check for backwards compatibility. (LP: #1387347)
 -- Marc Deslauriers <email address hidden>   Wed, 29 Oct 2014 15:55:34 -0400
Superseded in vivid-release
Obsolete in utopic-release
Deleted in utopic-proposed (Reason: moved to release)
sudo (1.8.9p5-1ubuntu2) utopic; urgency=medium

  * debian/sudo_root.8: mention sudo group instead of deprecated group
    admin (LP: #1130643)
 -- Andrey Bondarenko <email address hidden>   Sat, 23 Aug 2014 01:18:05 +0600
Obsolete in saucy-updates
Obsolete in saucy-security
sudo (1.8.6p3-0ubuntu3.1) saucy-security; urgency=medium

  * debian/sudo.sudo.init, debian/sudo-ldap.sudo.init: Set timestamps to
    epoch in init scripts so they are properly invalidated. (LP: #1223297)
 -- Marc Deslauriers <email address hidden>   Tue, 11 Mar 2014 08:00:06 -0400
Obsolete in quantal-updates
Obsolete in quantal-security
sudo (1.8.5p2-1ubuntu1.2) quantal-security; urgency=medium

  * debian/sudo.sudo.init, debian/sudo-ldap.sudo.init: Set timestamps to
    epoch in init scripts so they are properly invalidated. (LP: #1223297)
 -- Marc Deslauriers <email address hidden>   Tue, 11 Mar 2014 07:58:51 -0400
Superseded in precise-updates
Superseded in precise-security
sudo (1.8.3p1-1ubuntu3.6) precise-security; urgency=medium

  * SECURITY UPDATE: security policy bypass when env_reset is disabled
    - debian/patches/CVE-2014-0106.patch: fix logic inversion in
      plugins/sudoers/env.c.
    - CVE-2014-0106
  * debian/sudo.sudo.init, debian/sudo-ldap.sudo.init: Set timestamps to
    epoch in init scripts so they are properly invalidated. (LP: #1223297)
 -- Marc Deslauriers <email address hidden>   Tue, 11 Mar 2014 07:56:53 -0400
Superseded in lucid-updates
Superseded in lucid-security
sudo (1.7.2p1-1ubuntu5.7) lucid-security; urgency=medium

  * SECURITY UPDATE: security policy bypass when env_reset is disabled
    - env.c: fix logic inversion
    - http://www.sudo.ws/repos/sudo/rev/748cefb49422
    - CVE-2014-0106
 -- Marc Deslauriers <email address hidden>   Mon, 10 Mar 2014 13:43:32 -0400
Superseded in utopic-release
Published in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
sudo (1.8.9p5-1ubuntu1) trusty; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets --enable-admin-flag
      + install man/man8/sudo_root.8 in both flavours
      + install apport hooks
    - debian/sudoers:
      + also grant admin group sudo access
    - debian/source_sudo.py, debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
    - debian/sudo.pam:
      + Use pam_env to read /etc/environment and /etc/default/locale
        environment files. Reading ~/.pam_environment is not permitted due to
        security reasons.
    - debian/control:
      + dh-autoreconf dependency fixes missing-build-dependency-for-dh_-command
    - Remaining patches:
      + keep_home_by_default.patch: Keep HOME in the default environment
      + actually-use-buildflags: Pass LDFLAGS everywhere
      + add_probe_interfaces_setting.diff: option to disable network inf probe
  * add_probe_interfaces_setting.diff: fix to not modify NEWS file.

Superseded in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
sudo (1.8.9p4-1ubuntu2) trusty; urgency=medium

  * Enable and refresh: actually-use-buildflags: Pass LDFLAGS everywhere
  * Add the ability to disable network interface probing. This fixes
    performance issues with large number of network interfaces (LP: #1272414)
 -- Chris J Arges <email address hidden>   Tue, 28 Jan 2014 05:07:02 -0600
Superseded in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
sudo (1.8.9p4-1ubuntu1) trusty; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets --enable-admin-flag
      + install man/man8/sudo_root.8 in both flavours
      + install apport hooks
    - debian/sudoers:
      + also grant admin group sudo access
    - debian/source_sudo.py, debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
    - debian/sudo.pam:
      + Use pam_env to read /etc/environment and /etc/default/locale
        environment files. Reading ~/.pam_environment is not permitted due to
        security reasons.
    - debian/control:
      + dh-autoreconf dependency fixes missing-build-dependency-for-dh_-command
    - Remaining patches:
      + keep_home_by_default.patch: Keep HOME in the default environment
      + actually-use-buildflags: Pass LDFLAGS everywhere

Available diffs

Superseded in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
sudo (1.8.8-2ubuntu2) trusty; urgency=medium

  * Build using dh-autoreconf.
 -- Matthias Klose <email address hidden>   Sun, 15 Dec 2013 16:24:49 +0100

Available diffs

Superseded in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
sudo (1.8.8-2ubuntu1) trusty; urgency=low

  * Merge from Debian unstable. Remaining changes:
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets --enable-admin-flag
      + install man/man8/sudo_root.8 in both flavours
      + install apport hooks
    - debian/sudoers:
      + also grant admin group sudo access
    - debian/source_sudo.py, debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
    - debian/sudo.pam:
      + Use pam_env to read /etc/environment and /etc/default/locale
        environment files. Reading ~/.pam_environment is not permitted due to
        security reasons.
    - Remaining patches:
      + keep_home_by_default.patch: Keep HOME in the default environment
      + actually-use-buildflags: Pass LDFLAGS everywhere

Available diffs

Superseded in trusty-release
Obsolete in saucy-release
Obsolete in raring-release
Deleted in raring-proposed (Reason: moved to release)
sudo (1.8.6p3-0ubuntu3) raring; urgency=low

  * SECURITY UPDATE: authentication bypass via clock set to epoch
    - debian/patches/CVE-2013-1775.patch: ignore time stamp file if it is
      set to epoch in plugins/sudoers/check.c.
    - CVE-2013-1775
 -- Marc Deslauriers <email address hidden>   Wed, 27 Feb 2013 13:26:26 -0500
Obsolete in hardy-updates
Obsolete in hardy-security
sudo (1.6.9p10-1ubuntu3.10) hardy-security; urgency=low

  * SECURITY UPDATE: authentication bypass via clock set to epoch
    - debian/patches/CVE-2013-1775.patch: ignore time stamp file if it is
      set to epoch in check.c.
    - backported from ddf399e3e306ca238f6f1cda8153889b15bba12e
    - CVE-2013-1775
 -- Marc Deslauriers <email address hidden>   Wed, 27 Feb 2013 14:28:45 -0500
Superseded in lucid-updates
Superseded in lucid-security
sudo (1.7.2p1-1ubuntu5.6) lucid-security; urgency=low

  * SECURITY UPDATE: authentication bypass via clock set to epoch
    - debian/patches/CVE-2013-1775.patch: ignore time stamp file if it is
      set to epoch in check.c.
    - backported from ddf399e3e306ca238f6f1cda8153889b15bba12e
    - CVE-2013-1775
 -- Marc Deslauriers <email address hidden>   Wed, 27 Feb 2013 13:45:39 -0500
Obsolete in oneiric-updates
Obsolete in oneiric-security
sudo (1.7.4p6-1ubuntu2.2) oneiric-security; urgency=low

  * SECURITY UPDATE: authentication bypass via clock set to epoch
    - debian/patches/CVE-2013-1775.patch: ignore time stamp file if it is
      set to epoch in check.c.
    - CVE-2013-1775
 -- Marc Deslauriers <email address hidden>   Wed, 27 Feb 2013 13:38:01 -0500
Superseded in precise-updates
Superseded in precise-security
sudo (1.8.3p1-1ubuntu3.4) precise-security; urgency=low

  * SECURITY UPDATE: authentication bypass via clock set to epoch
    - debian/patches/CVE-2013-1775.patch: ignore time stamp file if it is
      set to epoch in plugins/sudoers/check.c.
    - CVE-2013-1775
 -- Marc Deslauriers <email address hidden>   Wed, 27 Feb 2013 13:34:15 -0500
Superseded in quantal-updates
Superseded in quantal-security
sudo (1.8.5p2-1ubuntu1.1) quantal-security; urgency=low

  * SECURITY UPDATE: authentication bypass via clock set to epoch
    - debian/patches/CVE-2013-1775.patch: ignore time stamp file if it is
      set to epoch in plugins/sudoers/check.c.
    - CVE-2013-1775
 -- Marc Deslauriers <email address hidden>   Wed, 27 Feb 2013 13:31:24 -0500
Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
sudo (1.8.6p3-0ubuntu2) raring; urgency=low

  * The latest sssd upload dropped the soname from libsss_sudo.so, so we
    can now drop our sudo delta and just use libsss_sudo.so directly.
 -- Stephane Graber <email address hidden>   Fri, 07 Dec 2012 23:11:45 -0500
Superseded in lucid-updates
Deleted in lucid-proposed (Reason: moved to -updates)
sudo (1.7.2p1-1ubuntu5.5) lucid-proposed; urgency=low

  * toke.{cl}: avoid duplicate fclose() of the sudoers file (LP: #553786)
    - http://www.sudo.ws/repos/sudo/rev/164d39108dde
 -- Marc Deslauriers <email address hidden>   Thu, 22 Nov 2012 16:08:01 -0500
Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
sudo (1.8.6p3-0ubuntu1) raring; urgency=low

  * New upstream release (1.8.6p3).
  * Add patch to fix building with sssd when ldap is disabled.
  * Drop sudo.manpages and sudo-ldap.manpages as the upstream build system
    now does the right thing here.
  * Build the main sudo package with support for sssd, this doesn't add any
    additional build time or runtime dependency. sudo will dynamically load
    the sssd library if 'sss' is listed for the 'sudoers' nss service.
 -- Stephane Graber <email address hidden>   Fri, 16 Nov 2012 09:31:32 -0500
Superseded in raring-release
Obsolete in quantal-release
sudo (1.8.5p2-1ubuntu1) quantal; urgency=low

  * Merge from debian/testing (LP: #1024154), remaining changes:
    - debian/patches/keep_home_by_default.patch:
      + Set HOME in initial_keepenv_table.
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets (Ubuntu specific)
      + install man/man8/sudo_root.8 in both flavours (Ubuntu specific)
      + install apport hooks
      + The ubuntu-sudo-as-admin-successful.patch was taken upstream by
        Debian however it requires a --enable-admin-flag configure flag to
        actually enable it in both flavours.
    - debian/control:
      + Mark Debian Vcs-* as XS-Debian-Vcs-*
      + update debian/control
    - debian/sudoers:
      + grant admin group sudo access
    - debian/source_sudo.py, debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
    - debian/sudo.pam:
      + Use pam_env to read /etc/environment and /etc/default/locale
        environment files. Reading ~/.pam_environment is not permitted due to
        security reasons.
  * Dropped changes:
    - debian/patches/lp927828-fix-abort-in-pam-modules-when-timestamp-valid.patch
      + Fixed upstream in 1.8.5
    - debian/patches/CVE-2012-2337.patch:
      + Fixed upstream in 1.8.4p5
    - debian/patches/pam_env_merge.patch:
      + Feature released upstream in 1.8.5
    - debian/{sudo,sudo-ldap}.{preinst,postinst,postrm}:
      + Drop Ubuntu-specific sudoers file migration code because the only
        upgrade path to quantal is from precise. All necessary sudoers file
        migration will have already been done by the time this version of the
        sudo package is installed.

Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
sudo (1.8.3p1-1ubuntu3.3) precise-proposed; urgency=low

  * debian/patches/pam_env_merge.patch: Merge the PAM environment into the
    user environment (LP: #982684)
  * debian/sudo.pam: Use pam_env to read /etc/environment and
    /etc/default/locale environment files. Reading ~/.pam_environment is not
    permitted due to security reasons.
 -- Tyler Hicks <email address hidden>   Mon, 21 May 2012 00:48:10 -0500
Superseded in quantal-release
sudo (1.8.3p2-1ubuntu2) quantal; urgency=low

  * debian/patches/pam_env_merge.patch: Merge the PAM environment into the
    user environment (LP: #982684)
  * debian/sudo.pam: Use pam_env to read /etc/environment and
    /etc/default/locale environment files. Reading ~/.pam_environment is not
    permitted due to security reasons.
 -- Tyler Hicks <email address hidden>   Mon, 21 May 2012 00:48:10 -0500
Superseded in quantal-release
sudo (1.8.3p2-1ubuntu1) quantal; urgency=low

  * Merge from debian/testing, remaining changes:
    - debian/patches/keep_home_by_default.patch:
      + Set HOME in initial_keepenv_table. (rebased for 1.8.3p1)
    - debian/patches/lp927828-fix-abort-in-pam-modules-when-timestamp-valid.patch
      + Fix Abort in some PAM modules when timestamp is valid. (LP: #927828)
    - debian/patches/CVE-2012-2337.patch: Don't perform IPv6 checks on IPv4
      addresses. Based on upstream patch.
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets (Ubuntu specific)
      + install man/man8/sudo_root.8 in both flavours (Ubuntu specific)
      + install apport hooks
      + The ubuntu-sudo-as-admin-successful.patch was taken upstream by
        Debian however it requires a --enable-admin-flag configure flag to
        actually enable it in both flavours.
    - debian/control:
      + Mark Debian Vcs-* as XS-Debian-Vcs-*
      + update debian/control
    - debian/sudoers:
      + grant admin group sudo access
    - debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
    - debian/sudo.preinst:
      + avoid conffile prompt by checking for known default /etc/sudoers
        and if found installing the correct default /etc/sudoers file.
        Modified for updated default sudoers. Aproach taken is different
        from Debian. Maybe this should now be dropped, since an LTS was
        released.

  * Dropped changes:
    - debian/patches/CVE-2012-0809.patch:
      + dropped, included in this new upstream release.
    - debian/patches/enable_badpass.patch:
      + dropped as Debian chose to set this by default in the sudoers.

Superseded in quantal-release
sudo (1.8.3p1-1ubuntu5) quantal; urgency=low

  * SECURITY UPDATE: Properly handle netmasks in sudoers Host and Host_List
    values (LP: #1000276)
    - debian/patches/CVE-2012-2337.patch: Don't perform IPv6 checks on IPv4
      addresses. Based on upstream patch.
    - CVE-2012-2337
 -- Tyler Hicks <email address hidden>   Wed, 16 May 2012 09:42:17 -0500
Superseded in hardy-updates
Superseded in hardy-security
sudo (1.6.9p10-1ubuntu3.9) hardy-security; urgency=low

  * SECURITY UPDATE: Properly handle multiple netmasks in sudoers Host and
    Host_List values
    - parse.c: Prevent IPv6 netmask-based address matching logic from
      incorrectly being applied to IPv4 addresses. Based on upstream patch
      written by Todd C. Miller.
    - CVE-2012-2337
 -- Tyler Hicks <email address hidden>   Tue, 15 May 2012 23:28:04 -0500
Superseded in lucid-updates
Superseded in lucid-security
sudo (1.7.2p1-1ubuntu5.4) lucid-security; urgency=low

  * SECURITY UPDATE: Properly handle multiple netmasks in sudoers Host and
    Host_List values
    - match.c: Prevent IPv6 netmask-based address matching logic from
      incorrectly being applied to IPv4 addresses. Based on upstream patch
      written by Todd C. Miller.
    - CVE-2012-2337
 -- Tyler Hicks <email address hidden>   Tue, 15 May 2012 23:28:04 -0500
Obsolete in natty-updates
Obsolete in natty-security
sudo (1.7.4p4-5ubuntu7.2) natty-security; urgency=low

  * SECURITY UPDATE: Properly handle multiple netmasks in sudoers Host and
    Host_List values
    - debian/patches/CVE-2012-2337.patch: Don't perform IPv6 checks on IPv4
      addresses. Based on upstream patch.
    - CVE-2012-2337
 -- Tyler Hicks <email address hidden>   Tue, 15 May 2012 23:28:04 -0500
Superseded in oneiric-updates
Superseded in oneiric-security
sudo (1.7.4p6-1ubuntu2.1) oneiric-security; urgency=low

  * SECURITY UPDATE: Properly handle multiple netmasks in sudoers Host and
    Host_List values
    - debian/patches/CVE-2012-2337.patch: Don't perform IPv6 checks on IPv4
      addresses. Based on upstream patch.
    - CVE-2012-2337
 -- Tyler Hicks <email address hidden>   Tue, 15 May 2012 23:28:04 -0500
Superseded in precise-updates
Superseded in precise-security
sudo (1.8.3p1-1ubuntu3.2) precise-security; urgency=low

  * SECURITY UPDATE: Properly handle multiple netmasks in sudoers Host and
    Host_List values
    - debian/patches/CVE-2012-2337.patch: Don't perform IPv6 checks on IPv4
      addresses. Based on upstream patch.
    - CVE-2012-2337
 -- Tyler Hicks <email address hidden>   Tue, 15 May 2012 23:28:04 -0500
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
sudo (1.8.3p1-1ubuntu3.1) precise-proposed; urgency=low

  * Fix Abort in some PAM modules when timestamp is valid. (LP: #927828)
 -- TJ (Ubuntu Contributions) <email address hidden>   Mon, 30 Apr 2012 18:05:21 +0100
Superseded in quantal-release
sudo (1.8.3p1-1ubuntu4) quantal; urgency=low

  * Fix Abort in some PAM modules when timestamp is valid. (LP: #927828)
 -- TJ (Ubuntu Contributions) <email address hidden>   Mon, 30 Apr 2012 17:55:27 +0100
Superseded in quantal-release
Published in precise-release
sudo (1.8.3p1-1ubuntu3) precise; urgency=low

  * SECURITY UPDATE: permissions bypass via format string
    - debian/patches/CVE-2012-0809.patch: fix format string vulnerability
      in src/sudo.c.
    - CVE-2012-0809
 -- Marc Deslauriers <email address hidden>   Tue, 31 Jan 2012 10:25:52 -0500
Superseded in precise-release
sudo (1.8.3p1-1ubuntu2) precise; urgency=low

  * debian/sudo.preinst:
    - updated to avoid conffile prompt by migrating to the new sudoers file
      changes in Precise. (LP: #894410)
 -- Marc Deslauriers <email address hidden>   Thu, 24 Nov 2011 10:48:58 -0500
Superseded in precise-release
sudo (1.8.3p1-1ubuntu1) precise; urgency=low

  * Merge from debian/testing, remaining changes:
    - debian/patches/keep_home_by_default.patch:
      + Set HOME in initial_keepenv_table. (rebased for 1.8.3p1)
    - debian/patches/enable_badpass.patch: turn on "mail_badpass" by default:
      + attempting sudo without knowing a login password is as bad as not
        being listed in the sudoers file, especially if getting the password
        wrong means doing the access-check-email-notification never happens
        (rebased for 1.8.3p1)
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets (Ubuntu specific)
      + install man/man8/sudo_root.8 (Ubuntu specific)
      + install apport hooks
      + The ubuntu-sudo-as-admin-successful.patch was taken upstream by
        Debian however it requires a --enable-admin-flag configure flag to
        actually enable it.
    - debian/sudoers:
      + grant admin group sudo access
    - debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
    - debian/sudo.preinst:
      + avoid conffile prompt by checking for known default /etc/sudoers
        and if found installing the correct default /etc/sudoers file

Superseded in precise-release
Obsolete in oneiric-release
sudo (1.7.4p6-1ubuntu2) oneiric; urgency=low

  * debian/patches/enable_badpass.patch: turn on "mail_badpass" by default:
    - attempting sudo without knowing a login password is as bad as not
      being listed in the sudoers file, especially if getting the password
      wrong means doing the access-check-email-notification never happens
      (Closes: 641218).
 -- Kees Cook <email address hidden>   Sun, 11 Sep 2011 10:29:08 -0700
Superseded in oneiric-release
sudo (1.7.4p6-1ubuntu1) oneiric; urgency=low

  * Merge from debian/unstable, remaining changes:
    - debian/patches/keep_home_by_default.patch:
      + Set HOME in initial_keepenv_table.
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets (Ubuntu specific)
      + install man/man8/sudo_root.8 (Ubuntu specific)
      + install apport hooks
    - debian/sudoers:
      + grant admin group sudo access
    - debian/sudo-ldap.dirs, debian/sudo.dirs:
      + add usr/share/apport/package-hooks
  * drop debian/patches/CVE-2011-0010.patch, applied upstream now

Superseded in natty-updates
Deleted in natty-proposed (Reason: moved to -updates)
sudo (1.7.4p4-5ubuntu7.1) natty-proposed; urgency=low

  * debian/sudo.preinst:
    - if well-known ec2 vmbuilder file is found, write a file in
      sudoers.d for the 'ubuntu' user (LP: #768625)
 -- Scott Moser <email address hidden>   Thu, 21 Apr 2011 18:04:34 -0400
Superseded in oneiric-release
sudo (1.7.4p4-5ubuntu8) oneiric; urgency=low

  * debian/sudo.preinst:
    - if well-known ec2 vmbuilder file is found, write a file in
      sudoers.d for the 'ubuntu' user (LP: #768625)
 -- Scott Moser <email address hidden>   Thu, 21 Apr 2011 18:04:34 -0400
Superseded in oneiric-release
Obsolete in natty-release
sudo (1.7.4p4-5ubuntu7) natty; urgency=low

  * debian/sudo.preinst:
    - do not consider the ec2 vmbuilder default sudoers file
      verbatim as its actually customized (LP: #761689)
 -- Michael Vogt <email address hidden>   Fri, 15 Apr 2011 16:40:10 +0200
Superseded in natty-release
sudo (1.7.4p4-5ubuntu6) natty; urgency=low

  * debian/patches/keep_home_by_default.patch: Set HOME in
    initial_keepenv_table.  LP: #760140
 -- Steve Langasek <email address hidden>   Wed, 13 Apr 2011 12:32:25 -0700
Superseded in natty-release
sudo (1.7.4p4-5ubuntu5) natty; urgency=low

  * debian/sudo.preinst:
    - avoid conffile prompt by checking for known default /etc/sudoers
      and if found installing the correct default /etc/sudoers file
      (LP: #690873)
 -- Michael Vogt <email address hidden>   Fri, 25 Mar 2011 09:13:43 +0100
Superseded in natty-release
sudo (1.7.4p4-5ubuntu4) natty; urgency=low

  * debian/rules: The ubuntu-sudo-as-admin-successful.patch was taken
    upstream by Debian however it requires a --enable-admin-flag configure
    flag to actually enable it.
    (LP: #706045)
 -- Bryce Harrington <email address hidden>   Thu, 10 Feb 2011 12:01:53 -0800
Superseded in natty-release
sudo (1.7.4p4-5ubuntu3) natty; urgency=low

  * SECURITY UPDATE: privilege escalation via -g when using group Runas_List
    - debian/patches/CVE-2011-0010.patch: prompt for password when the user is
      running sudo as himself but as a different group
    - CVE-2011-0010
 -- Jamie Strandboge <email address hidden>   Tue, 18 Jan 2011 16:37:09 -0600
Obsolete in maverick-updates
Obsolete in maverick-security
sudo (1.7.2p7-1ubuntu2.1) maverick-security; urgency=low

  * SECURITY UPDATE: privilege escalation via -g when using group Runas_List
    - debian/patches/user_in_group.patch: add user_in_group(), backported from
      upstream
    - debian/patches/CVE-2011-0010.patch: prompt for password when the user is
      running sudo as himself but as a different group
    - CVE-2011-0010
 -- Jamie Strandboge <email address hidden>   Wed, 19 Jan 2011 10:30:27 -0600
Superseded in lucid-updates
Superseded in lucid-security
sudo (1.7.2p1-1ubuntu5.3) lucid-security; urgency=low

  * SECURITY UPDATE: privilege escalation via -g when using group Runas_List
    - pwutil.c, sudo.h: add user_in_group(), backported from upstream commits
      48ca8c2eddf8, 72df368a8a0e and 6ebc55d4716b. This is intended to be used
      only with check.c to fix CVE-2011-0010 instead of doing the refactoring.
      Going forward, will need to look at this code also if a flaw is found in
      this refactored code. If needed, the refactoring work is in 48ca8c2eddf8
      and 6ebc55d4716b.
    - check.c: prompt for password when the user is running sudo as himself
      but as a different group. Backported from fe8a94f96542.
    - CVE-2011-0010
 -- Jamie Strandboge <email address hidden>   Wed, 19 Jan 2011 10:39:09 -0600
Obsolete in karmic-updates
Obsolete in karmic-security
sudo (1.7.0-1ubuntu2.6) karmic-security; urgency=low

  * SECURITY UPDATE: privilege escalation via -g when using group Runas_List
    - pwutil.c, sudo.h: add user_in_group(), backported from upstream commits
      48ca8c2eddf8, 72df368a8a0e and 6ebc55d4716b. This is intended to be used
      only with check.c to fix CVE-2011-0010 instead of doing the refactoring.
      Going forward, will need to look at this code also if a flaw is found in
      this refactored code. If needed, the refactoring work is in 48ca8c2eddf8
      and 6ebc55d4716b.
    - check.c: prompt for password when the user is running sudo as himself
      but as a different group. Based on fe8a94f96542.
    - CVE-2011-0010
 -- Jamie Strandboge <email address hidden>   Wed, 19 Jan 2011 10:46:05 -0600
Superseded in natty-release
sudo (1.7.4p4-5ubuntu2) natty; urgency=low

  * debian/sudoers: temporarily workaround LP #690873 by adding %admin
    into the default sudoers file in case people just say "yes" to the
    dpkg conffile prompt.
 -- Kees Cook <email address hidden>   Wed, 15 Dec 2010 15:38:17 -0800
Superseded in natty-release
sudo (1.7.4p4-5ubuntu1) natty; urgency=low

  * Merge from debian unstable (LP: #689025), remaining changes:
    - debian/rules:
      + compile with --without-lecture --with-tty-tickets (Ubuntu specific)
      + install man/man8/sudo_root.8 (Ubuntu specific)
      + install apport hooks
    - debian/sudo-ldap.dirs, debian/sudo.dirs: add
      usr/share/apport/package-hooks
  * This upload also fixes: LP: #609645

Superseded in natty-release
sudo (1.7.2p7-1ubuntu3) natty; urgency=low

  * No-change upload to drop sizable upstream changelog.
 -- Martin Pitt <email address hidden>   Mon, 22 Nov 2010 11:24:33 +0100
Superseded in karmic-updates
Superseded in karmic-security
sudo (1.7.0-1ubuntu2.5) karmic-security; urgency=low

  * SECURITY UPDATE: privilege escalation via '-g' option when using
    'user:group' in Runas_Spec
    - update match.c to verify both user and group match sudoers when using
      '-g'. Based on patch from upstream.
    - CVE-2010-2956
 -- Jamie Strandboge <email address hidden>   Tue, 31 Aug 2010 15:55:00 -0500
Superseded in lucid-updates
Superseded in lucid-security
sudo (1.7.2p1-1ubuntu5.2) lucid-security; urgency=low

  * SECURITY UPDATE: privilege escalation via '-g' option when using
    'user:group' in Runas_Spec
    - update match.c to verify both user and group match sudoers when using
      '-g'. Patch thanks to upstream.
    - CVE-2010-2956
 -- Jamie Strandboge <email address hidden>   Tue, 31 Aug 2010 15:16:00 -0500
Superseded in natty-release
Obsolete in maverick-release
sudo (1.7.2p7-1ubuntu2) maverick; urgency=low

  * SECURITY UPDATE: privilege escalation via '-g' option when using
    'user:group' in Runas_Spec
    - debian/patches/CVE-2010-2956.patch: update match.c to verify both user
      and group match sudoers when using '-g'
    - CVE-2010-2956
 -- Jamie Strandboge <email address hidden>   Tue, 31 Aug 2010 14:54:06 -0500
Superseded in maverick-release
sudo (1.7.2p7-1ubuntu1) maverick; urgency=low

  * Merge from debian unstable.  Remaining changes:
   - debian/rules:
     - compile with --without-lecture --with-tty-tickets (Ubuntu specific)
     - install man/man8/sudo_root.8 (Ubuntu specific)
     - install apport hooks
   - debian/sudo-ldap.dirs, debian/sudo.dirs: add
     usr/share/apport/package-hooks
   - debian/patches/ubuntu-sudo-as-admin-successful.patch: adjust sudo.c so
     that if the user successfully authenticated and he is in the 'admin'
     group, then create a stamp ~/.sudo_as_admin_successful. Our default bash
     profile checks for this and displays a short intro about sudo if the flag
     is not present
  * Dropped the following, now included upstream:
    - fix for CVE-2010-1163
    - fix for CVE-2010-0426
    - debian/sudo.postinst, debian/sudo-ldap.postinst: update description to
      match behavior in sudoers file
    - don't install init script. Debian moved to /var/lib/sudo from
      /var/run/sudo, so Ubuntu's tmpfs usage won't clean those out
      automatically any more, so we now need the initscript.

Superseded in karmic-updates
Superseded in karmic-security
sudo (1.7.0-1ubuntu2.4) karmic-security; urgency=low

  * SECURITY UPDATE: properly handle multiple PATH variables when using
    secure_path in env.c
    - Adapted http://www.sudo.ws/repos/sudo/raw-rev/a09c6812eaec
    - CVE-2010-1646
 -- Jamie Strandboge <email address hidden>   Mon, 28 Jun 2010 16:41:06 -0500
Superseded in lucid-updates
Superseded in lucid-security
sudo (1.7.2p1-1ubuntu5.1) lucid-security; urgency=low

  * SECURITY UPDATE: properly handle multiple PATH variables when using
    secure_path in env.c
    - http://www.sudo.ws/repos/sudo/raw-rev/a09c6812eaec
    - CVE-2010-1646
 -- Jamie Strandboge <email address hidden>   Fri, 18 Jun 2010 14:00:54 -0500
Obsolete in jaunty-updates
Obsolete in jaunty-security
sudo (1.6.9p17-1ubuntu3.3) jaunty-security; urgency=low

  * SECURITY UPDATE: properly handle multiple PATH variables when using
    secure_path in env.c
    - http://www.sudo.ws/repos/sudo/raw-rev/3057fde43cf0
    - CVE-2010-1646
 -- Jamie Strandboge <email address hidden>   Fri, 18 Jun 2010 13:59:38 -0500
Superseded in hardy-updates
Superseded in hardy-security
sudo (1.6.9p10-1ubuntu3.8) hardy-security; urgency=low

  * SECURITY UPDATE: properly handle multiple PATH variables when using
    secure_path in env.c
    - http://www.sudo.ws/repos/sudo/raw-rev/3057fde43cf0
    - CVE-2010-1646
 -- Jamie Strandboge <email address hidden>   Fri, 18 Jun 2010 13:57:12 -0500
Obsolete in dapper-updates
Obsolete in dapper-security
sudo (1.6.8p12-1ubuntu6.3) dapper-security; urgency=low

  * SECURITY UPDATE: properly handle multiple PATH variables when using
    secure_path in env.c
    - http://www.sudo.ws/repos/sudo/raw-rev/3057fde43cf0
    - CVE-2010-1646
 -- Jamie Strandboge <email address hidden>   Fri, 18 Jun 2010 14:11:17 -0500
Superseded in dapper-updates
Superseded in dapper-security
sudo (1.6.8p12-1ubuntu6.2) dapper-security; urgency=low

  * SECURITY UPDATE: properly verify path in find_path.c for the 'sudoedit'
    pseudo-command when running from the current working directory and
    secure_path is disabled
    - CVE-2010-XXXX
 -- Jamie Strandboge <email address hidden>   Tue, 13 Apr 2010 12:21:57 -0500
76150 of 209 results