Package: sudo Version: 1.8.3p2-1 Severity: important Tags: security $ ls /tmp/krb5cc_$(id -u)_* | wc -l 54
$ sudo -k & sudo true [sudo] password for sam: $ ls /tmp/krb5cc_$(id -u)_* | wc -l 55 This may be caused by the same bug as #640785 (where cgroups created by libpam-systemd are not cleaned up after sudo is run). -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-1-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages sudo depends on: ii libc6 2.13-26 ii libpam-modules 1.1.3-7 ii libpam0g 1.1.3-7 ii libselinux1 2.1.0-4.1 sudo recommends no packages. sudo suggests no packages. -- Configuration Files: /etc/sudoers [Errno 13] Permission denied: u'/etc/sudoers' /etc/sudoers.d/README [Errno 13] Permission denied: u'/etc/sudoers.d/README' -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org