Package: sudo Version: 1.9.9-1 Severity: normal Hi,
I noticed that the latest version of sudo ships a mask /etc/systemd/system/sudo.service -> /dev/null which is created dynamically via the maintainer scripts. Please consider simply shipping the mask in the package statically in /lib/systemd/system/ as was done before. Regards, Michael -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable'), (200, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.15.0-3-amd64 (SMP w/4 CPU threads) Kernel taint flags: TAINT_FIRMWARE_WORKAROUND, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages sudo depends on: ii init-system-helpers 1.61 ii libaudit1 1:3.0.6-1+b1 ii libc6 2.33-5 ii libpam-modules 1.4.0-11 ii libpam0g 1.4.0-11 ii libselinux1 3.3-1+b1 ii lsb-base 11.1.0 ii zlib1g 1:1.2.11.dfsg-2 sudo recommends no packages. sudo suggests no packages. -- Configuration Files: /etc/sudoers [Errno 13] Keine Berechtigung: '/etc/sudoers' /etc/sudoers.d/README [Errno 13] Keine Berechtigung: '/etc/sudoers.d/README' -- no debconf information