[riscv-reports] [#88203] sisyphus_riscv64 DONE srpm=sudo-1.9.16p2-alt3.src.rpm
Girar sisyphus_riscv64 pender recycler
noreply at basealt.ru
Wed Jul 2 02:39:27 MSK 2025
http://web.build.srt.basealt.ru/tasks/archive/done/_86/88203/logs/events.1.2.log
subtask name riscv64
#100 sudo 5:47
2025-Jul-01 23:35:17 :: shared task #88203 for sisyphus_riscv64 started by recycler:
2025-Jul-01 23:35:17 :: message: sync
#100 build sudo-1.9.16p2-alt3.src.rpm
2025-Jul-01 23:35:25 :: [riscv64] #100 sudo-1.9.16p2-alt3.src.rpm: build start
2025-Jul-01 23:36:20 :: [riscv64] #100 sudo-1.9.16p2-alt3.src.rpm: build OK (cached)
2025-Jul-01 23:36:22 :: #100: sudo-1.9.16p2-alt3.src.rpm: build check OK
2025-Jul-01 23:36:22 :: build check OK
2025-Jul-01 23:36:22 :: noarch check OK
2025-Jul-01 23:36:23 :: plan: src +1 -1 =19223, noarch +1 -1 =20344, riscv64 +6 -6 =33368
#100 sudo 1.9.16p2-alt2 -> 1:1.9.16p2-alt3
Tue Jul 01 2025 Evgeny Sinelnikov <sin at altlinux.org> 1:1.9.16p2-alt3
- Security release (fixes: CVE-2025-32462, CVE-2025-32463) (closes: 55007):
+ Sudo's -h (--host) option could be specified when running a command or
editing a file. This could enable a local privilege escalation attack if the
sudoers file allows the user to run commands on a different host.
For more information, see Local Privilege Escalation via host option:
https://www.sudo.ws/security/advisories/host_any/
+ An attacker can leverage sudo's -R (--chroot) option to run arbitrary
commands as root, even if they are not listed in the sudoers file. The chroot
support has been deprecated an will be removed entirely in a future release.
[...]
2025-Jul-01 23:36:43 :: patched apt indices
2025-Jul-01 23:36:45 :: created next repo
2025-Jul-01 23:36:54 :: duplicate provides check OK
2025-Jul-01 23:37:15 :: dependencies check OK
2025-Jul-01 23:37:32 :: [riscv64] ELF symbols check OK
2025-Jul-01 23:37:56 :: [riscv64.0] #100 sudo: install check start
2025-Jul-01 23:37:57 :: [riscv64.1] #100 sudo-devel: install check start
2025-Jul-01 23:37:57 :: [riscv64.2] #100 sudo-logsrvd: install check start
2025-Jul-01 23:37:57 :: [riscv64.3] #100 sudo-python: install check start
2025-Jul-01 23:38:45 :: [riscv64.0] #100 sudo: install check OK (cached)
2025-Jul-01 23:38:46 :: [riscv64.1] #100 sudo-devel: install check OK (cached)
2025-Jul-01 23:38:46 :: [riscv64.2] #100 sudo-logsrvd: install check OK (cached)
2025-Jul-01 23:38:47 :: [riscv64.3] #100 sudo-python: install check OK (cached)
2025-Jul-01 23:38:54 :: gears inheritance check OK
2025-Jul-01 23:38:54 :: srpm inheritance check OK
check-subtask-perms: #100: sudo: approved by superuser iv
2025-Jul-01 23:38:55 :: acl check OK
2025-Jul-01 23:39:11 :: created contents_index files
2025-Jul-01 23:39:14 :: created hash files: noarch riscv64 src
2025-Jul-01 23:39:15 :: task #88203 for sisyphus_riscv64 TESTED
2025-Jul-01 23:39:16 :: task is ready for commit
2025-Jul-01 23:39:18 :: repo clone OK
2025-Jul-01 23:39:18 :: packages update OK
2025-Jul-01 23:39:20 :: [riscv64 noarch] update OK
2025-Jul-01 23:39:20 :: repo update OK
2025-Jul-01 23:39:23 :: repo save OK
2025-Jul-01 23:39:23 :: src index update OK
fatal: tag '1.9.16p2-alt3' already exists
2025-Jul-01 23:39:24 :: updated /srpms/s/sudo.git branch `sisyphus_riscv64'
fatal: no tag exactly matches '8d06292cffd1186a73445c5d982a7bcc9b279f59'
2025-Jul-01 23:39:27 :: gears update OK
2025-Jul-01 23:39:27 :: task #88203 for sisyphus_riscv64 DONE
More information about the Riscv-reports
mailing list