notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
Port details on branch 2023Q1
sudo Allow others to run commands as root
1.9.13p3 security on this many watch lists=1 search for ports that depend on this port Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 1.9.16p1Version of this port present on the latest quarterly branch.
Maintainer: garga@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2023-01-18 20:18:06
Last Update: 2023-03-09 15:46:01
Commit Hash: 212d8d8
People watching this port, also watch:: mailutils, osv-scanner, opensmtpd, memcached, tmux
License: sudo
WWW:
https://www.sudo.ws/
Description:
This is the CU version of sudo. Sudo is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. The basic philosophy is to give as few privileges as possible but still allow people to get their work done.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb - no subversion history for this port

Manual pages:
pkg-plist: as obtained via: make generate-plist
Expand this list (148 items)
Collapse this list.
  1. @ldconfig
  2. /usr/local/share/licenses/sudo-1.9.13p3/catalog.mk
  3. /usr/local/share/licenses/sudo-1.9.13p3/LICENSE
  4. /usr/local/share/licenses/sudo-1.9.13p3/sudo
  5. bin/cvtsudoers
  6. bin/sudo
  7. bin/sudoedit
  8. bin/sudoreplay
  9. @sample etc/pam.d/sudo.default etc/pam.d/sudo
  10. @sample etc/sudo.conf.sample
  11. @sample etc/sudo_logsrvd.conf.sample
  12. @sample etc/sudoers.dist etc/sudoers
  13. include/sudo_plugin.h
  14. libexec/sudo/audit_json.so
  15. libexec/sudo/group_file.so
  16. libexec/sudo/libsudo_util.so
  17. libexec/sudo/libsudo_util.so.0
  18. libexec/sudo/libsudo_util.so.0.0.0
  19. @comment libexec/sudo/python_plugin.so
  20. libexec/sudo/sudo_intercept.so
  21. libexec/sudo/sudo_noexec.so
  22. libexec/sudo/sudoers.so
  23. libexec/sudo/system_group.so
  24. man/man1/cvtsudoers.1.gz
  25. man/man5/sudo.conf.5.gz
  26. man/man5/sudo_logsrv.proto.5.gz
  27. man/man5/sudo_logsrvd.conf.5.gz
  28. man/man5/sudo_plugin.5.gz
  29. @comment man/man5/sudo_plugin_python.5.gz
  30. man/man5/sudoers.5.gz
  31. man/man5/sudoers_timestamp.5.gz
  32. @comment man/man5/sudoers.ldap.5.gz
  33. man/man8/sudo.8.gz
  34. man/man8/sudo_logsrvd.8.gz
  35. man/man8/sudo_sendlog.8.gz
  36. man/man8/sudoedit.8.gz
  37. man/man8/sudoreplay.8.gz
  38. man/man8/visudo.8.gz
  39. sbin/visudo
  40. sbin/sudo_logsrvd
  41. sbin/sudo_sendlog
  42. share/doc/sudo/CONTRIBUTING.md
  43. share/doc/sudo/CONTRIBUTORS.md
  44. share/doc/sudo/ChangeLog
  45. share/doc/sudo/HISTORY.md
  46. share/doc/sudo/LICENSE.md
  47. share/doc/sudo/NEWS
  48. share/doc/sudo/README.md
  49. share/doc/sudo/SECURITY.md
  50. share/doc/sudo/TROUBLESHOOTING.md
  51. share/doc/sudo/UPGRADE.md
  52. @comment share/doc/sudo/README.LDAP.md
  53. @comment share/doc/sudo/schema.ActiveDirectory
  54. @comment share/doc/sudo/schema.OpenLDAP
  55. @comment share/doc/sudo/schema.iPlanet
  56. @comment share/doc/sudo/schema.olcSudo
  57. share/examples/sudo/cvtsudoers.conf
  58. share/examples/sudo/pam.conf
  59. share/examples/sudo/sudo.conf
  60. share/examples/sudo/sudo_logsrvd.conf
  61. share/examples/sudo/sudoers
  62. share/examples/sudo/syslog.conf
  63. @comment share/examples/sudo/example_approval_plugin.py
  64. @comment share/examples/sudo/example_audit_plugin.py
  65. @comment share/examples/sudo/example_conversation.py
  66. @comment share/examples/sudo/example_debugging.py
  67. @comment share/examples/sudo/example_group_plugin.py
  68. @comment share/examples/sudo/example_io_plugin.py
  69. @comment share/examples/sudo/example_policy_plugin.py
  70. share/locale/ast/LC_MESSAGES/sudo.mo
  71. share/locale/ast/LC_MESSAGES/sudoers.mo
  72. share/locale/ca/LC_MESSAGES/sudo.mo
  73. share/locale/ca/LC_MESSAGES/sudoers.mo
  74. share/locale/cs/LC_MESSAGES/sudo.mo
  75. share/locale/cs/LC_MESSAGES/sudoers.mo
  76. share/locale/da/LC_MESSAGES/sudo.mo
  77. share/locale/da/LC_MESSAGES/sudoers.mo
  78. share/locale/de/LC_MESSAGES/sudo.mo
  79. share/locale/de/LC_MESSAGES/sudoers.mo
  80. share/locale/el/LC_MESSAGES/sudoers.mo
  81. share/locale/eo/LC_MESSAGES/sudo.mo
  82. share/locale/eo/LC_MESSAGES/sudoers.mo
  83. share/locale/es/LC_MESSAGES/sudo.mo
  84. share/locale/es/LC_MESSAGES/sudoers.mo
  85. share/locale/eu/LC_MESSAGES/sudo.mo
  86. share/locale/eu/LC_MESSAGES/sudoers.mo
  87. share/locale/fa/LC_MESSAGES/sudo.mo
  88. share/locale/fi/LC_MESSAGES/sudo.mo
  89. share/locale/fi/LC_MESSAGES/sudoers.mo
  90. share/locale/fr/LC_MESSAGES/sudo.mo
  91. share/locale/fr/LC_MESSAGES/sudoers.mo
  92. share/locale/fur/LC_MESSAGES/sudo.mo
  93. share/locale/fur/LC_MESSAGES/sudoers.mo
  94. share/locale/gl/LC_MESSAGES/sudo.mo
  95. share/locale/hr/LC_MESSAGES/sudo.mo
  96. share/locale/hr/LC_MESSAGES/sudoers.mo
  97. share/locale/hu/LC_MESSAGES/sudo.mo
  98. share/locale/hu/LC_MESSAGES/sudoers.mo
  99. share/locale/it/LC_MESSAGES/sudo.mo
  100. share/locale/it/LC_MESSAGES/sudoers.mo
  101. share/locale/ja/LC_MESSAGES/sudo.mo
  102. share/locale/ja/LC_MESSAGES/sudoers.mo
  103. share/locale/ka/LC_MESSAGES/sudo.mo
  104. share/locale/ka/LC_MESSAGES/sudoers.mo
  105. share/locale/ko/LC_MESSAGES/sudo.mo
  106. share/locale/ko/LC_MESSAGES/sudoers.mo
  107. share/locale/lt/LC_MESSAGES/sudoers.mo
  108. share/locale/nb/LC_MESSAGES/sudo.mo
  109. share/locale/nb/LC_MESSAGES/sudoers.mo
  110. share/locale/nl/LC_MESSAGES/sudo.mo
  111. share/locale/nl/LC_MESSAGES/sudoers.mo
  112. share/locale/nn/LC_MESSAGES/sudo.mo
  113. share/locale/pl/LC_MESSAGES/sudo.mo
  114. share/locale/pl/LC_MESSAGES/sudoers.mo
  115. share/locale/pt/LC_MESSAGES/sudo.mo
  116. share/locale/pt/LC_MESSAGES/sudoers.mo
  117. share/locale/pt_BR/LC_MESSAGES/sudo.mo
  118. share/locale/pt_BR/LC_MESSAGES/sudoers.mo
  119. share/locale/ro/LC_MESSAGES/sudo.mo
  120. share/locale/ro/LC_MESSAGES/sudoers.mo
  121. share/locale/ru/LC_MESSAGES/sudo.mo
  122. share/locale/ru/LC_MESSAGES/sudoers.mo
  123. share/locale/sk/LC_MESSAGES/sudo.mo
  124. share/locale/sk/LC_MESSAGES/sudoers.mo
  125. share/locale/sl/LC_MESSAGES/sudo.mo
  126. share/locale/sl/LC_MESSAGES/sudoers.mo
  127. share/locale/sq/LC_MESSAGES/sudo.mo
  128. share/locale/sr/LC_MESSAGES/sudo.mo
  129. share/locale/sr/LC_MESSAGES/sudoers.mo
  130. share/locale/sv/LC_MESSAGES/sudo.mo
  131. share/locale/sv/LC_MESSAGES/sudoers.mo
  132. share/locale/tr/LC_MESSAGES/sudo.mo
  133. share/locale/tr/LC_MESSAGES/sudoers.mo
  134. share/locale/uk/LC_MESSAGES/sudo.mo
  135. share/locale/uk/LC_MESSAGES/sudoers.mo
  136. share/locale/vi/LC_MESSAGES/sudo.mo
  137. share/locale/vi/LC_MESSAGES/sudoers.mo
  138. share/locale/zh_CN/LC_MESSAGES/sudo.mo
  139. share/locale/zh_CN/LC_MESSAGES/sudoers.mo
  140. share/locale/zh_TW/LC_MESSAGES/sudo.mo
  141. share/locale/zh_TW/LC_MESSAGES/sudoers.mo
  142. @dir etc/sudoers.d
  143. @dir /var/db/sudo/lectured
  144. @dir /var/db/sudo
  145. @dir /var/run/sudo
  146. @owner
  147. @group
  148. @mode
Collapse this list.
Dependency lines:
  • sudo>0:security/sudo
To install the port:
cd /usr/ports/security/sudo/ && make install clean
To add the package, run one of these commands:
  • pkg install security/sudo
  • pkg install sudo
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: sudo
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1678176488 SHA256 (sudo-1.9.13p3.tar.gz) = 92334a12bb93e0c056b09f53e255ccb7d6f67c6350e2813cd9593ceeca78560b SIZE (sudo-1.9.13p3.tar.gz) = 5100355

No package information for this port in our database
Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link: pkg-fallout
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. msgfmt : devel/gettext-tools
Library dependencies:
  1. libintl.so : devel/gettext-runtime
This port is required by:
for Run
  1. sysutils/cbsd

Configuration Options:
===> The following configuration options are available for sudo-1.9.13p3: AUDIT=on: Enable BSM audit support DISABLE_AUTH=off: Do not require authentication by default DISABLE_ROOT_SUDO=off: Do not allow root to run sudo DOCS=on: Build and/or install documentation EXAMPLES=on: Build and/or install examples INSULTS=off: Enable insults on failures LDAP=off: LDAP protocol support NLS=on: Native Language Support NOARGS_SHELL=off: Run a shell if no arguments are given OPIE=off: Enable one-time passwords (no PAM support) PAM=on: Pluggable authentication module support PYTHON=off: Enable python plugin support SSSD=off: Enable SSSD backend support. ====> Enable Kerberos 5 authentication (no PAM support): you can only select none or one of them GSSAPI_BASE=off: GSSAPI support via base system (needs Kerberos) GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal GSSAPI_MIT=off: GSSAPI support via security/krb5 ===> Use 'make config' to modify these settings
Options name:
security_sudo
USES:
cpe libtool gettext
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (27 items)
Collapse this list.
  1. ftp://core.ring.gr.jp/pub/misc/sudo/
  2. ftp://ftp.arcane-networks.fr/pub/mirrors/sudo/
  3. ftp://ftp.cin.nihon-u.ac.jp/pub/misc/sudo/
  4. ftp://ftp.cs.tu-berlin.de/pub/misc/sudo/
  5. ftp://ftp.in2p3.fr/pub/sudo/
  6. ftp://ftp.informatik.uni-hamburg.de/pub/os/unix/utils/sudo/
  7. ftp://ftp.ring.gr.jp/pub/misc/sudo/
  8. ftp://ftp.st.ryukoku.ac.jp/pub/security/tool/sudo/
  9. ftp://ftp.sudo.ws/pub/sudo/
  10. ftp://ftp.tuwien.ac.at/utils/admin-tools/sudo/
  11. ftp://ftp.twaren.net/Unix/Security/Sudo/
  12. ftp://ftp.usbm.de/pub/sudo/
  13. ftp://ftp.uwsg.indiana.edu/pub/security/sudo/
  14. ftp://mirror.cdmon.com/pub/sudo/
  15. ftp://obsd.isc.org/pub/sudo/
  16. ftp://plier.ucar.edu/pub/sudo/
  17. ftp://sunsite.icm.edu.pl/packages/sudo/
  18. ftp://sunsite.ualberta.ca/pub/Mirror/sudo/
  19. ftp://zoot.tele.dk/pub/sudo/
  20. http://core.ring.gr.jp/archives/misc/sudo/
  21. http://ftp.arcane-networks.fr/pub/mirrors/sudo/
  22. http://ftp.twaren.net/Unix/Security/Sudo/
  23. http://sudo-ftp.basemirror.de/
  24. http://sudo.cybermirror.org/
  25. http://sudo.p8ra.de/sudo/dist/
  26. http://www.ring.gr.jp/archives/misc/sudo/
  27. https://www.sudo.ws/sudo/dist/
Collapse this list.

Number of commits found: 5

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
1.9.13p3
09 Mar 2023 15:46:01
commit hash: 212d8d8f9cb00c16dbc52affa3e1668daf1fe599commit hash: 212d8d8f9cb00c16dbc52affa3e1668daf1fe599commit hash: 212d8d8f9cb00c16dbc52affa3e1668daf1fe599commit hash: 212d8d8f9cb00c16dbc52affa3e1668daf1fe599 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
Author: Yasuhiro Kimura
security/sudo: Update to 1.9.13p3

PR		270002
Approved by:	garga (maintainer - private email to myself, implicit)
		message-id: 816dd4b5-0a0d-3dd2-4bcc-c9b3b1a4ddfd@FreeBSD.org
ChangeLog:	https://www.sudo.ws/releases/stable/#1.9.13p3

(cherry picked from commit 6ab8398875fba68be034a9a0ab12047c9ea929c6)
1.9.13p2
02 Mar 2023 00:00:27
commit hash: 070b02bcc05be2fe69ba156ee9da9add5b98e79dcommit hash: 070b02bcc05be2fe69ba156ee9da9add5b98e79dcommit hash: 070b02bcc05be2fe69ba156ee9da9add5b98e79dcommit hash: 070b02bcc05be2fe69ba156ee9da9add5b98e79d files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.13p2

Major changes between sudo 1.9.13p2 and 1.9.13p1:

 * Fixed the --enable-static-sudoers option, broken in sudo 1.9.13.
   GitHub issue #245.

 * Fixed a potential double-free bug when matching a sudoers rule
   that contains a per-command chroot directive (CHROOT=dir).  This
   bug was introduced in sudo 1.9.8.

PR:		269854
Approved by:	garga

(cherry picked from commit e974396d4c309caf72beca2db8bdd7282bf2c8e1)
1.9.13p1
20 Feb 2023 14:24:18
commit hash: 82154fe15a961dfb5dd23161b84be4ac379c57c0commit hash: 82154fe15a961dfb5dd23161b84be4ac379c57c0commit hash: 82154fe15a961dfb5dd23161b84be4ac379c57c0commit hash: 82154fe15a961dfb5dd23161b84be4ac379c57c0 files touched by this commit
Renato Botelho (garga) search for other commits by this committer
security/sudo: Upgrade to 1.9.13p1

Sponsored by:	Rubicon Communications, LLC ("Netgate")

(cherry picked from commit 375637c7c8bf537201236f0370fa9afde5143274)
1.9.13
16 Feb 2023 01:20:38
commit hash: f2a9e111cf52a37653f8f3d8093ceef069d3c478commit hash: f2a9e111cf52a37653f8f3d8093ceef069d3c478commit hash: f2a9e111cf52a37653f8f3d8093ceef069d3c478commit hash: f2a9e111cf52a37653f8f3d8093ceef069d3c478 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/sudo: Update to 1.9.13

Major changes between sudo 1.9.13 and 1.9.12p2:

 * Fixed a bug running relative commands via sudo when "log_subcmds"
   is enabled.  GitHub issue #194.

 * Fixed a signal handling bug when running sudo commands in a shell
   script.  Signals were not being forwarded to the command when
   the sudo process was not run in its own process group.

 * Fixed a bug in cvtsudoers' LDIF parsing when the file ends without
   a newline and a backslash is the last character of the file.

 * Fixed a potential use-after-free bug with cvtsudoers filtering.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
1.9.12p2
18 Jan 2023 20:15:38
commit hash: e4b0eefa183226d3d6cb8be568a5a3aa586c12b9commit hash: e4b0eefa183226d3d6cb8be568a5a3aa586c12b9commit hash: e4b0eefa183226d3d6cb8be568a5a3aa586c12b9commit hash: e4b0eefa183226d3d6cb8be568a5a3aa586c12b9 files touched by this commit
Renato Botelho (garga) search for other commits by this committer
Author: Cy Schubert
security/sudo: Update to 1.9.12p2

Major changes between sudo 1.9.12p2 and 1.9.12p1:

 * Fixed a compilation error on Linux/aarch64.  GitHub issue #197.

 * Fixed a potential crash introduced in the fix for GitHub issue #134.
   If a user's sudoers entry did not have any RunAs user's set,
   running "sudo -U otheruser -l" would dereference a NULL pointer.

 * Fixed a bug introduced in sudo 1.9.12 that could prevent sudo
   from creating a I/O files when the "iolog_file" sudoers setting
   contains six or more Xs.

 * Fixed CVE-2023-22809, a flaw in sudo's -e option (aka sudoedit)
(Only the first 15 lines of the commit message are shown above View all of this commit message)

Number of commits found: 5