sudo-1.7.6p2-0.7.1<>,L4O@/=„4/{@rZ%/\1, PP"/]:rrqY ot)=}LJ1< J,l!FǟCw SHV8B3j+KƵ@1\r3PKȽުufX=|P`Ͽ$ ^wXZsלC M  TU2l㯖.Kېm6 g[0G4E3:# p}vu?:O5icz28&4Yl>7' ?&d  3pt| (## # @# # # # D# #  # L p  (8$ 9X := >!F!G!#H"L#I"#X"Y#\#(#]##^% b%c&nd&e&f&l&z&Csudo1.7.6p20.7.1Execute some commands as rootSudo is a command that allows users to execute some commands as root. The /etc/sudoers file (edited with 'visudo') specifies which users have access to sudo and which commands they can run. Sudo logs all its activities to syslogd, so the system administrator can keep an eye on things. Sudo asks for the password for initializing a check period of a given time N (where N is defined at installation and is set to 5 minutes by default). Authors: -------- Jeff Nieusma David Hieb Ian McCloghrie O͸build27JopenSUSE 11.4openSUSEBSD3c(or similar)http://bugs.opensuse.orgSystem/Basehttp://www.sudo.ws/linuxi586chmod 0440 /etc/sudoers #bnc#712434 rm -rf /var/run/sudo jN`4%T HgLon$eqh#^.~--EAA$ AA큤AOͳOͳOͳOͳOͲOͳOʹOͳOʹOʹOʹOͳOʹOͷMuLRM8MtBKS6LHMCIyO͉LIMbM_M:MbMbOͳOͳOͳOͳOͳOͳOͲ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-1.7.6p2-0.7.1.src.rpmlibsudo_noexec.sosudosudo(x86-32)    @@@@@@@@@@@@@@@@@@@@@ coreutils/bin/shrpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)/usr/bin/perllibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.11)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.2.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)liblber-2.4.so.2libldap-2.4.so.2libpam.so.0libpam.so.0(LIBPAM_1.0)libselinux.so.1libutil.so.1libutil.so.1(GLIBC_2.0)libz.so.1libz.so.1(ZLIB_1.2.3.3)rpmlib(PayloadIsLzma)4.0.4-14.0-13.0.4-14.4.6-14.8.0O@N>@N[@MA^@M.@L(Lk@LGK@KK^@J[!I@vcizek@suse.czvcizek@suse.compuzel@suse.comcprause@novell.compuzel@novell.comjengelh@medozas.depascal.bleser@opensuse.orgpuzel@novell.compuzel@novell.comprusnak@suse.czjengelh@medozas.deprusnak@suse.czprusnak@suse.cz- escape values passed to ldap_search (bnc#724490)- manpage claimed keeping DISPLAY environment variable (bnc#720181)- update to sudo-1.7.6p2 (bnc#681296) - see /usr/share/doc/packages/sudo/NEWS- added openldap schema file (bnc#667558)- add sudo-CVE-2011-0010.patch (bnc#663881)- use %_smp_mflags- update to 1.7.2p7: * portability fixes - changes from 1.7.2p6: * Handle duplicate variables in the environment * visudo: fix a crash when checking a sudoers file that has aliases that reference themselves * aliases: fix use after free in error message when a duplicate alias exists * visudo: prevent NULL dereference in printf() - removed sudo-CVE-2010-1163.patch (merged upstream) - removed sudo-CVE-2010-1646.patch (merged upstream)- add sudo-CVE-2010-1646.patch (bnc#594738)- add sudo-CVE-2010-1163.patch (bnc#594738)- updated to 1.7.2p4 * Fixed the expansion of the %h escape in #include file names introduced in sudo 1.7.1. * Fixed a a bug where the negation operator in a Cmnd_List was not being honored. * No longer produce a parse error when #includedir references a directory that contains no valid filenames. * The sudo.man.pl and sudoers.man.pl files are now included in the distribution for people who wish to regenerate the man pages. * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos. * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early so they can be used during authentication. * Fix printing of entries with multiple host entries on a single line. * Fix use after free when sending error messages via email. * Use setrlimit64(), if available, instead of setrlimit() when setting AIX resource limits since rlim_t is 32bits. * Fix size arg when realloc()ing include stack. * Avoid a duplicate fclose() of the sudoers file. * Fix a bug that could allow users with permission to run sudoedit to run arbitrary commands.- SPARC requires large PIE model- updated to 1.7.2 * A new #includedir directive is available in sudoers. This can be used to implement an /etc/sudo.d directory. Files in an includedir are not edited by visudo unless they contain a syntax error. * The -g option did not work properly when only setting the group (and not the user). Also, in -l mode the wrong user was displayed for sudoers entries where only the group was allowed to be set. * Fixed a problem with the alias checking in visudo which could prevent visudo from exiting. * Sudo will now correctly parse the shell-style /etc/environment file format used by pam_env on Linux. * When doing password and group database lookups, sudo will only cache an entry by name or by id, depending on how the entry was looked up. Previously, sudo would cache by both name and id from a single lookup, but this breaks sites that have multiple password or group database names that map to the same uid or gid. * User and group names in sudoers may now be enclosed in double quotes to avoid having to escape special characters. * BSM audit fixes when changing to a non-root uid. * Experimental non-Unix group support. Currently only works with Quest Authorization Services and allows Active Directory groups fixes for Minix-3. * For Netscape/Mozilla-derived LDAP SDKs the certificate and key paths may be specified as a directory or a file. However, version 5.0 of the SDK only appears to support using a directory (despite documentation to the contrary). If SSL client initialization fails and the certificate or key paths look like they could be default file name, strip off the last path element and try again. * A setenv() compatibility fix for Linux systems, where a NULL value is treated the same as an empty string and the variable name is checked against the NULL pointer.- updated to 1.7.1 * A new Defaults option "pwfeedback" will cause sudo to provide visual feedback when the user is entering a password. * A new Defaults option "fast_glob" will cause sudo to use the fnmatch() function for file name globbing instead of glob(). When this option is enabled, sudo will not check the file system when expanding wildcards. This is faster but a side effect is that relative paths with wildcard will no longer work. * The file name specified with the #include directive may now include a %h escape which is expanded to the short form of hostname. * The -k flag may now be specified along with a command, causing the user's timestamp file to be ignored. * The unused alias checks in visudo now handle the case of an alias referring to another alias./bin/shbuild27 1325780408Z[\WAdSi/osXx     U߾TTQR:1.7.6p2-0.7.11.7.6p2-0.7.1 openldapschemasudo.schemasudosudoerssudosudoeditsudoreplaysudoseshsudo_noexec.sosudoers2ldifvisudosudoChangeLogHISTORYLICENSENEWSPORTINGREADMEREADME.LDAPREADME.SUSETROUBLESHOOTINGsudo.podsudoers.ldap.podsudoers.podsudoreplay.podvisudo.podsudoers.5.gzsudoers.ldap.5.gzsudo.8.gzsudoedit.8.gzsudoreplay.8.gzvisudo.8.gzsudo/etc//etc/openldap//etc/openldap/schema//etc/pam.d//usr/bin//usr/lib//usr/lib/sudo//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/sudo//usr/share/man/man5//usr/share/man/man8//var/lib/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/3834cc09b3396ccd75218de72b27a2a6-sudocpiolzma5i586-suse-linux()uH:!?] "k%UU*+xW61q7Ӱq kĢk")*WAL_ӃYcsF,1ϛGO|/`O c.ԧB{ػJZɂ.pCGsA]hᐴ+x $ 3S jƭ~:;LM3$+ Q~/ω\|z@Gܥ͌ ;0$Fh0mmy@pas&O;)F@/:Bɸ:3!DZU_Y ѹγZo*M dMA<>T=(2\8\n1v7FLbҋN|y%̰YW~TDwg/r98@`m=e .=.dP3WqFⲹcDFѲA-߬THP>{7nn֔2{FO3ڲ.KW{RbsUtr"%p ! [b1Ü۽RdJb&K_k,BNL%_*+q &=KeX&\Oׄڢ>-p"ʨ3`7QsWϕ#cCH}F9!\#@TJ.2DdxLQ5z7,fg)G-w/Ĭ;;MOCi30 Hڬc|[ZZ[g51W)&ApЮdw1Bo4&f"V|1k71<\M$9 (ew \|&OlXIu+_ʞ@mSr["djT4q2wCˍjDFxG 5 u75 -Ã]Yam qb gewh ?6ke@Gp?.C 'ԅb+^aJM,t{:O4Aн LAR_7%2h߈DW^Vyz3ı@1\򧭒|cgض#SyC F0|u{"VQ;LBP[g/}N6M+`S1-BC$a~v0W4:; '$ &bsZCEAj) DGb~V'ЋntZS`Q'\j 29UyQg@°\,RIQIjȮ:LŦkOpIs"ilM7zWН3&7r(o=E<ᇗGL-9lɊVcXŖPJД#P3cƝ=K )N8|yQ[ADːVù\s]^_/R,R2WŏNē*y< 1DVz6$"X9 &~lJyY&%w[^H$X:= q鰏K k͐2Gx X>TIj:9G$:N2u|_Pqq,aзqtE~UFo:SIb{uD%>z(s5-TQcXjojr8Pj;ml>J" aM0G ,N{NArVդ^p*Qx)X=b`kfB 7%e줦@2E{ BKavhK.| Faw@8'| lSFAnvjA͋6aK[`űskL2,#}uNje,2:&n=BJS91"gK ޯ$ְSm1yPBat6h]Alc^ٕ,B& abz9HD]u8tʷ&[7WO43ye %e#iRZR`UM5mQ]iu \JVDrK( H6tuΐhA$:tFҘA 8#mpӓKj` mӰEXL{8p[J,JuQ'ɶxqε?H7wnp5YPKb\4Qz ٻsfE N ̃BN6#ʘW kLT.~UUs|P߱DS!֑溺X6cE:0D7[ǯw5ג2K]Ii{1G'(фX,ToFj e l2Z vRz=ZN"yefߘᇼr*?;#у:58Ŝu[oH,%fߨ;ДQtOroiK\L*doW왏!0ⓜaےm#dBF&GoidTY1W2%N'B\H_ _|Yk` sR>Q]*OxHxk^'β)x~LGyww܅`x*:4N<3#q#{WEKRbɋ+ę!YB6h@ɢ[Uiێ# l>'MNc1i4yIT滣B)ɸ%GTc5$ WDyu=kQ|=_+  cs l͘QTMG|BĽ^٬ݾ{1z5M%$=_ߓ/L$]wFN2hvw _9gīpiIlQ NJïkU&ٌѪL؝(';Sם"5!ҧa 5Q9Hh‘5BɌ+_D&6aׇ=4&+V8 D{Xe;Y~d?K=gAURV*E s[7TFuv 3\氬Fyw8)sn0ț{Wkkmgqe@=ּB[ZvLS$:HP~a_P@F~S0e?W4"}C,t bh&!'yhm̧w2u@rtUJbT' P6# b2mu ݚNDvq!<{pyYsKFўq%hT3ՆzEbED0BJ-qrt峛ӯY&qF"|És>Z>D_*ID cIO%ʜC=5-0˒D- ӹ>c|3k]xzq'QXL']Փۀ /nMgS? 5eڄ÷,P^.eQDreF1 ?z[k}ŏ5vԎN}U|B(>2a~`7J| #Wu uf#RȦ17ES:Oj\b u I 4:b tOR acc_Ye-YWyE܉cHUWL]҈t¸vFt3hOfx8#Oh?@zRUC`:ӥc.or΍ #Y@+bʓ OQ8 h(lEśyV\CڲtFRl݂`1Tp6{s^nZ2mNGL|MlX)zʈF#rzIKJZʋd镨{a ӫ T0/:Í rk"~=/~hhGKAZu,\NdnD2X'wb-uqqh ǘ>-K~ s~Y3GkT0<{I|A!J"/RՋ@*F}0π#ͨI!_ ش-KEOt%۬$l>ÙJ5C^j\dyc} rth=!+^/]pܳ o>獤p'u"EDLv*RPH 3 GajUMѾR{1lJ3hXT//j¨a zhEPWϒsܻӖ1 &cdĴRe2kVkb]Ёyr#-ݬNqy3^L:$2 ӲeuQUdijb˛*y77U=s±*V^oàm ˂LL0ߺ(V(Bap]'X1اRl%H]܉2>?0F0m3YBJȋ^upwa3,8$46б$WlKæ9PiX7u{3xixdD Z-MYhea6  E0%Sv9pt[lUCQ8}p+;%c76s2%B?kSBxE)IEA*.`=?l.Fo}6]Xur QWF$Uk4 5!rܑyjB(G~tw6~8ڼ#;&琽9~EZ~s-ǫ%~=pֵuȡs"pLLSoasZquJ[ PN|>,tƝIz^\zc3VMS |rP934pi0_Rӟ7qۈkr,__|? TiiK 06N1@-6\=w2x _pn%$;|onM(1n@~n@IЄ6qowg c/eG|ݷ$OsM,82C٣(8=gPTYhØ!{i'L 4 ZV쌀ؒ"t}G wVDn7]>rț\K朗K6m 2.3J9ōvV0 hf*Z$9sxC:" K{tH(DV`wtO1C( ih9S1\o>eI0;[d:[ԵDf>a,! 6c!Fwku1O=788t [*&_o `]#^c3.Wv"trjڒ:qKrTՄxbTDE]&N)?|d<ُݯ' cyf-u!]ܳQlMtO!D*+HT2P^+~ B0fV f1XPkM \ 䡾-?9 4ާsg=>:}̃P7OOFNĎz\?-IS I|TYs 4NP[EFc(֞Yfn EF}g5ռfE+F$M ƑE~X`crUף.pۭEvs@!"uFZ6m'A(YdY S`xrcZҽ_