sudo-1.7.6p2-0.23.1e>UA6Tm8<~|w!?Sw}`$jg&zyoDL{GL;|9ľ<`Lg>7)?)d  4pt| $## # <# # # # @# #  # H l  (8 9h:>$QF$YG$l#H$#I%#X%Y%\%#]&`#^' b(c)d)e)f)l)z)Csudo1.7.6p20.23.1Execute some commands as rootSudo is a command that allows users to execute some commands as root. The /etc/sudoers file (edited with 'visudo') specifies which users have access to sudo and which commands they can run. Sudo logs all its activities to syslogd, so the system administrator can keep an eye on things. Sudo asks for the password for initializing a check period of a given time N (where N is defined at installation and is set to 5 minutes by default). Authors: -------- Jeff Nieusma David Hieb Ian McCloghrie Sw}`build31JopenSUSE 11.4openSUSEBSD-3-Clausehttp://bugs.opensuse.orgSystem/Basehttp://www.sudo.ws/linuxi586chmod 0440 /etc/sudoers #bnc#712434 rm -rf /var/run/sudo jN`4%T HgLon$eqh#^.~--EAA$ AA큤ASw}^Sw}^Sw}^Sw}^Sw}^Sw}^Sw}_Sw}^Sw}_Sw}_Sw}_Sw}^Sw}_Sw}`MuLRM8MtBKS6LHMCIySw}OLIMbM_M:MbMbSw}^Sw}^Sw}^Sw}^Sw}^Sw}^Sw}^0232525cae1aa2711426bc6eab0ac1b8648941c74bc780169ea86356037fa2eec140adc362317c85028ba850a5f28abedae8ad85625ae6191196c22727f47937c4b60cba774eb2968eabb192962b620114c3acc03293a111fc111034b31b0871c7b08714e2c05fbaa4528331c4fa0e7a4e08f08788096efa9c1e2dc94de28311de24be20c5ed5a9951afd6ffb436984d7ece0271c70ca9d3a172efc85eb9afeb64a785efa81b78c2c08f6e74183494a685a213d6b0f999606c0e6a54a17b349051cab5704657b634c31004727a71a0690e961ac19eebb24bedb99cce5ecd73043cdf42a7e656c063eb5e4c32ce35b44b87f656a3e7d6ac73e3f24f940fdc23a371f0567f0be632dbf35772d3d4139af28ff3e0dd01da5ea47ad5f1cb64e6cbdca4c5e510ba6a900d0c8ae59f644365b67899a83a43a90d073b3138b3b90c96bfac16ac1a52819bcb21e296914f5f8189c852726a81611bbc2b4155595b1cd2799729417b955486894e1b392b4eee2b401f29e81fb42d0218db56ff103df745cb7a33793f08a907869e43d61b085bcd22001ed4db6367fddda4098baff9788f63001ed4db6367fddda4098baff9788f63097cb5c04cb098290f388a28128cd3f8e3c93d1e4b94429c5c823317819ea7d7sudorootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootsudo-1.7.6p2-0.23.1.src.rpmlibsudo_noexec.sosudosudo(x86-32)    @@@@@@@@@@@@@@@@@@@@@ coreutils/bin/shrpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)/usr/bin/perllibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.11)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.2.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)liblber-2.4.so.2libldap-2.4.so.2libpam.so.0libpam.so.0(LIBPAM_1.0)libselinux.so.1libutil.so.1libutil.so.1(GLIBC_2.0)libz.so.1libz.so.1(ZLIB_1.2.3.3)rpmlib(PayloadIsLzma)4.0.4-14.0-13.0.4-14.4.6-14.8.0SwO@Q5@OȮO9OO@N>@N[@MA^@M.@L(Lk@LGK@KK^@J[!I@lijewski.stefan@gmail.comlijewski.stefan@gmail.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.czvcizek@suse.compuzel@suse.comcprause@novell.compuzel@novell.comjengelh@medozas.depascal.bleser@opensuse.orgpuzel@novell.compuzel@novell.comprusnak@suse.czjengelh@medozas.deprusnak@suse.czprusnak@suse.cz- fixed security issues with logic inversion when checking environment variables on the command line against the blacklist. This is only a problem when env_reset is disabled. * CVE-2014-0106 (bnc#866503) + sudo-1.7.6p2-CVE-2014-0106.patch- added two security fixes: * CVE-2013-1775 (bnc#806919) + sudo-1.7.6p2-CVE-2013-1775.patch * CVE-2013-1776 (bnc#806921) + sudo-1.7.6p2-CVE-2013-1776.patch- set global ldap option before ldap init (bnc#760697)- open and close PAM session in the same process (bnc#751453)- fix for CVE-2012-2337 (bnc#762327)- escape values passed to ldap_search (bnc#724490)- manpage claimed keeping DISPLAY environment variable (bnc#720181)- update to sudo-1.7.6p2 (bnc#681296) - see /usr/share/doc/packages/sudo/NEWS- added openldap schema file (bnc#667558)- add sudo-CVE-2011-0010.patch (bnc#663881)- use %_smp_mflags- update to 1.7.2p7: * portability fixes - changes from 1.7.2p6: * Handle duplicate variables in the environment * visudo: fix a crash when checking a sudoers file that has aliases that reference themselves * aliases: fix use after free in error message when a duplicate alias exists * visudo: prevent NULL dereference in printf() - removed sudo-CVE-2010-1163.patch (merged upstream) - removed sudo-CVE-2010-1646.patch (merged upstream)- add sudo-CVE-2010-1646.patch (bnc#594738)- add sudo-CVE-2010-1163.patch (bnc#594738)- updated to 1.7.2p4 * Fixed the expansion of the %h escape in #include file names introduced in sudo 1.7.1. * Fixed a a bug where the negation operator in a Cmnd_List was not being honored. * No longer produce a parse error when #includedir references a directory that contains no valid filenames. * The sudo.man.pl and sudoers.man.pl files are now included in the distribution for people who wish to regenerate the man pages. * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos. * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early so they can be used during authentication. * Fix printing of entries with multiple host entries on a single line. * Fix use after free when sending error messages via email. * Use setrlimit64(), if available, instead of setrlimit() when setting AIX resource limits since rlim_t is 32bits. * Fix size arg when realloc()ing include stack. * Avoid a duplicate fclose() of the sudoers file. * Fix a bug that could allow users with permission to run sudoedit to run arbitrary commands.- SPARC requires large PIE model- updated to 1.7.2 * A new #includedir directive is available in sudoers. This can be used to implement an /etc/sudo.d directory. Files in an includedir are not edited by visudo unless they contain a syntax error. * The -g option did not work properly when only setting the group (and not the user). Also, in -l mode the wrong user was displayed for sudoers entries where only the group was allowed to be set. * Fixed a problem with the alias checking in visudo which could prevent visudo from exiting. * Sudo will now correctly parse the shell-style /etc/environment file format used by pam_env on Linux. * When doing password and group database lookups, sudo will only cache an entry by name or by id, depending on how the entry was looked up. Previously, sudo would cache by both name and id from a single lookup, but this breaks sites that have multiple password or group database names that map to the same uid or gid. * User and group names in sudoers may now be enclosed in double quotes to avoid having to escape special characters. * BSM audit fixes when changing to a non-root uid. * Experimental non-Unix group support. Currently only works with Quest Authorization Services and allows Active Directory groups fixes for Minix-3. * For Netscape/Mozilla-derived LDAP SDKs the certificate and key paths may be specified as a directory or a file. However, version 5.0 of the SDK only appears to support using a directory (despite documentation to the contrary). If SSL client initialization fails and the certificate or key paths look like they could be default file name, strip off the last path element and try again. * A setenv() compatibility fix for Linux systems, where a NULL value is treated the same as an empty string and the variable name is checked against the NULL pointer.- updated to 1.7.1 * A new Defaults option "pwfeedback" will cause sudo to provide visual feedback when the user is entering a password. * A new Defaults option "fast_glob" will cause sudo to use the fnmatch() function for file name globbing instead of glob(). When this option is enabled, sudo will not check the file system when expanding wildcards. This is faster but a side effect is that relative paths with wildcard will no longer work. * The file name specified with the #include directive may now include a %h escape which is expanded to the short form of hostname. * The -k flag may now be specified along with a command, causing the user's timestamp file to be ignored. * The unused alias checks in visudo now handle the case of an alias referring to another alias./bin/shbuild31 1400339808]^_ZDdTi2os[x7EFGRHIJKLMNOPQWUUVX=1.7.6p2-0.23.11.7.6p2-0.23.1 openldapschemasudo.schemasudosudoerssudosudoeditsudoreplaysudoseshsudo_noexec.sosudoers2ldifvisudosudoChangeLogHISTORYLICENSENEWSPORTINGREADMEREADME.LDAPREADME.SUSETROUBLESHOOTINGsudo.podsudoers.ldap.podsudoers.podsudoreplay.podvisudo.podsudoers.5.gzsudoers.ldap.5.gzsudo.8.gzsudoedit.8.gzsudoreplay.8.gzvisudo.8.gzsudo/etc//etc/openldap//etc/openldap/schema//etc/pam.d//usr/bin//usr/lib//usr/lib/sudo//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/sudo//usr/share/man/man5//usr/share/man/man8//var/lib/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Evergreen:Maintenance:280/openSUSE_Evergreen_11.4/41a14e2c9c4443560dd6176bf46ac937-sudo.openSUSE_Evergreen_11.4drpmlzma5i586-suse-linuxSK ?]"k%Yʄ+xW61i>+wI6IzWmr'0tN-IOʑo XޟG'vr>]҆T&̏E#$2in{vjRo?tNDPyybo?:6+_pX{^kc̽58C;6vQW2W7t,_#WrRI8P/}UW = g:[)Qݩacا -5##U)PKLib1PX*A bͪ-ʰ1p9Yga\p[nTxCn/ \LN;2cXrv\6T^~[5ߓ C4y<./Қ5֝7{V#=6w!gK A w%owAw ͥD yZH.3*1sJ7 ?U "{xƅB*{r.Mj㐕tI. 0k~Y-SExn&bӘ,GIa5伝/dF M4P;1\ޤȝFꘚa& 5p_8-#˥ r.*i5f>SRA#N_ Fus F,2"T~ئ\E*vr hKq_|Aܼ93&WM{i3dI!|]>"#v0[6)3L)@ *5d*R`RCi߿:2y/=<fe:x#98=lGilEv+rq*}`GO8gqħB\//UK(LO:wۻ* WAn3+2k!QbgK\.KHU-Zv~!}1Ɖ9d7Z9 8ؓ9eJ-Qm ࣄ4c8UXȱH)_A鮒"3}~#J~ V`$t31 ݳˊQ{ Zy[j)?m`υUϓ/\+vFF'N m_o(Dp⊯Ŝ9!H&|F_s&(y $T.eql֬ DŽm֗vf)a3SǏ@RȞ