Package: sudo
Version: 1.8.3p2-1
Severity: important
Tags: security

$ ls /tmp/krb5cc_$(id -u)_* | wc -l
54

$ sudo -k & sudo true
[sudo] password for sam: 

$ ls /tmp/krb5cc_$(id -u)_* | wc -l
55

This may be caused by the same bug as #640785 (where cgroups created by
libpam-systemd are not cleaned up after sudo is run).

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages sudo depends on:
ii  libc6           2.13-26
ii  libpam-modules  1.1.3-7
ii  libpam0g        1.1.3-7
ii  libselinux1     2.1.0-4.1

sudo recommends no packages.

sudo suggests no packages.

-- Configuration Files:
/etc/sudoers [Errno 13] Permission denied: u'/etc/sudoers'
/etc/sudoers.d/README [Errno 13] Permission denied: u'/etc/sudoers.d/README'

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to