kumquat-buildroot/package/sudo/0001-make-signame-include-unistd_h.patch
Gustavo Zacarias 3bd38b4eca sudo: security bump to version 1.8.12
Fixes CVE-2014-9680 - A user with sudo access may be able to exploit
parsing bugs in the time zone parsing functions of the system's C
library functions. The user may also be able to read arbitrary files,
potentially causing changes in system behavior when reading certain
device special files or simply causing the program run via sudo to
block.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
2015-02-17 14:01:14 +01:00

21 lines
856 B
Diff

signame.c uses sudo_compat.h which in turn uses gid_t definitions
that are normally defined in unistd.h.
This doesn't seem to cause issues with (e)glibc systems, but it does break
uClibc-based builds.
Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
diff -Nura sudo-1.8.12.orig/lib/util/mksigname.c sudo-1.8.12/lib/util/mksigname.c
--- sudo-1.8.12.orig/lib/util/mksigname.c 2015-02-09 15:40:10.000000000 -0300
+++ sudo-1.8.12/lib/util/mksigname.c 2015-02-17 09:20:05.126701093 -0300
@@ -44,6 +44,9 @@
printf("#include <config.h>\n");
printf("#include <signal.h>\n");
+ printf("#ifdef HAVE_UNISTD_H\n");
+ printf("#include <unistd.h>\n");
+ printf("#endif /* HAVE_UNISTD_H */\n");
printf("#include \"sudo_compat.h\"\n\n");
printf("const char *const sudo_sys_signame[NSIG] = {\n");
for (i = 0; i < NSIG; i++) {