Skip to content

Latest commit

 

History

History
130 lines (104 loc) · 4.96 KB

CHANGELOG.md

File metadata and controls

130 lines (104 loc) · 4.96 KB

Changelog

0.2.3 - 2024-07-11

Changed

  • Portability: sudo-rs now is compatible with s390x-unknown-linux-gnu
  • Removed unneeded code & fix hints given by newer Rust version

Fixed

  • visudo would not properly truncate a sudoers file
  • high CPU load when child process did not terminate after closure of a terminal

0.2.2 - 2024-02-02

Changed

  • Several changes to the code to improve type safety
  • Improved error message when a PTY cannot be opened
  • Improved portability of the PAM bindings
  • su: improved parsing of su command line options
  • Add path information to parse errors originating from included files

Fixed

  • Fixed a panic with large messages written to the syslog
  • sudo: respect --login regardless of the presence of --chdir

0.2.1 - 2023-09-21

Changed

  • Session records/timestamps are now stored in files with uids instead of usernames, fixing a security bug (CVE-2023-42456)
  • visudo will now resolve EDITOR via PATH
  • Input/output errors while writing text to the terminal no longer cause sudo to exit immediately
  • Switched several internal API calls from libc to Rust's std library
  • The %h escape sequence in sudoers includes directives is not supported in sudo-rs, this now gives a better diagnostic and no longer tries to include the file
  • Our PAM integration was hardened against allocation failures
  • An attempt was made to harden against rowhammer type attacks
  • Release builds no longer include debugging symbols

Fixed

  • Fixed an invalid parsing when an escaped null byte was present in the sudoers file
  • Replaced informal error message in visudo with a proper error message

0.2.0 - 2023-08-29

Added

  • visudo can set/fix file permissions using the --perms CLI flag
  • visudo can set/fix the file owner using the --owner CLI flag
  • Read env_editor from sudoers file for visudo
  • Add basic support for --list in sudo

Changed

  • visudo now uses a random filename for the temporary file you are editing
  • su now runs with a PTY by default
  • Included files with relative paths in the sudoers file are imported relative from the sudoers file
  • sudo now checks if ownership and setuid bits have been set correctly on its binary
  • When syslog messages are too large they will be split between multiple messages to prevent message truncation
  • We now accept a wider range of dependencies
  • Our MSRV (minimum supported rust version) has been set at 1.70.0

Fixed

  • Set arg0 to the non-resolved filename when running a command, preventing issues with symlinks when commands rely on link filenames

0.2.0-dev.20230711 - 2023-07-11

Added

  • Add initial visudo implementation
  • Add support for ~ in --chdir
  • Log commands that will be executed in the auth syslog
  • Add a manpage for the sudo command

Changed

  • The SUDO_RS_IS_UNSTABLE environment variable is no longer required
  • Sudo-rs will now read /etc/sudoers-rs or /etc/sudoers if the former is not available. We no longer read /etc/sudoers.test
  • Removed signal-hook and signal-hook-registry dependencies
  • Improved error handling when --chdir is passed but not allowed
  • Properly handle SIGWINCH when running commands with a PTY

Fixed

  • Only call ttyname and isatty on character devices
  • Fixed a bug in syslog FFI

0.2.0-dev.20230703 - 2023-07-03

Added

  • Add timestamp_timeout support in sudoers file
  • Add ability to disable use_pty in the sudoers file

Changed

  • Set the TTY name for PAM sessions on a TTY
  • Set the requesting user for PAM sessions
  • Simplified some error messages when a command could not be executed
  • Reveal less about what caused a command not to be executable
  • Continued rework of the pty exec

Fixed

  • Fixed exit codes for su
  • Fixed environment filtering for su
  • Fixed SHELL handling for su

0.2.0-dev.20230627 - 2023-06-27

Added

  • Add passwd_tries support in sudoers file
  • Add developer logs (only enabled with the dev feature)

Changed

  • Only use a PTY to spawn the process if a TTY is available
  • Continued rework of the pty exec
  • Aliasing is now implemented similarly to the original sudo
  • You can no longer define an ALL alias in the sudoers file
  • Use canonicalized paths for the executed binaries
  • Simplified CLI help to only display supported actions