Your message dated Sun, 12 Jul 2020 09:57:33 -0600
with message-id <874kqck9oy....@gag.com>
and subject line Re: Bug#964922: sudo: segmentation fault when include
directive is active in /etc/sudoers
has caused the Debian Bug report #964922,
regarding sudo: segmentation fault when include directive is active in
/etc/sudoers
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
964922: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964922
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sudo
Version: 1.9.1-1
Severity: critical
Justification: breaks unrelated software
Dear Maintainer,
Hi there,
when uncommenting the "include" directive in /etc/sudoers:
includedir /etc/sudoers.d
then sudo crashes with a segmentation fault (stacktrace generated on
debian/unstable -- see version info below this stacktrace):
gdb -batch -n -ex 'set pagination off' -ex run -ex bt -ex 'bt full' -ex 'thread
apply all bt full' --args sudo ls
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Program received signal SIGSEGV, Segmentation fault.
0x0000000000000000 in ?? ()
#0 0x0000000000000000 in ?? ()
#1 0x00007ffa722fddbc in sudoerserror (s=0x7ffa72324082 "syntax error") at
gram.y:953
#2 0x00007ffa722fe9dc in sudoersparse () at gram.c:1248
#3 0x00007ffa722d8657 in sudo_file_parse (nss=0x7ffa7233f500 <sudo_nss_file>)
at ../../../plugins/sudoers/file.c:102
#4 0x00007ffa722ef596 in sudoers_init (info=info@entry=0x7ffc614930d0,
envp=envp@entry=0x7ffc61493430) at ../../../plugins/sudoers/sudoers.c:207
#5 0x00007ffa722f9540 in sudoers_audit_open (version=<optimized out>,
conversation=<optimized out>, plugin_printf=<optimized out>,
settings=0x559b286b9830, user_info=0x559b286b5d00, submit_optind=<optimized
out>, submit_argv=0x7ffc61493418, submit_envp=0x7ffc61493430,
plugin_options=0x0, errstr=0x7ffc614931c0) at
../../../plugins/sudoers/audit.c:158
#6 0x0000559b28448207 in audit_open_int (errstr=0x7ffc614931c0,
submit_envp=0x7ffc61493430, submit_argv=0x7ffc61493418, submit_optind=1,
user_info=0x559b286b5d00, settings=0x559b2846d5c0 <sudo_settings>,
plugin=0x559b286b9a40) at ../../src/sudo.c:1543
#7 audit_open (submit_envp=0x7ffc61493430, submit_argv=0x7ffc61493418,
submit_optind=1, user_info=0x559b286b5d00, settings=0x559b2846d5c0
<sudo_settings>) at ../../src/sudo.c:1563
#8 main (argc=<optimized out>, argv=0x7ffc61493418, envp=0x7ffc61493430) at
../../src/sudo.c:238
#0 0x0000000000000000 in ?? ()
No symbol table info available.
#1 0x00007ffa722fddbc in sudoerserror (s=0x7ffa72324082 "syntax error") at
gram.y:953
fmt = ">>> %s: %s near line %d <<<\n"
oldlocale = 1
sudo_debug_subsys = 0
__func__ = "sudoerserror"
#2 0x00007ffa722fe9dc in sudoersparse () at gram.c:1248
yym = <optimized out>
yyn = <optimized out>
yystate = 23
#3 0x00007ffa722d8657 in sudo_file_parse (nss=0x7ffa7233f500 <sudo_nss_file>)
at ../../../plugins/sudoers/file.c:102
sudo_debug_subsys = 0
__func__ = "sudo_file_parse"
handle = 0x559b286be510
#4 0x00007ffa722ef596 in sudoers_init (info=info@entry=0x7ffc614930d0,
envp=envp@entry=0x7ffc61493430) at ../../../plugins/sudoers/sudoers.c:207
nss = 0x7ffa7233f500 <sudo_nss_file>
nss_next = 0x0
oldlocale = 0
sources = 0
ret = -1
sudo_debug_subsys = 0
__func__ = "sudoers_init"
#5 0x00007ffa722f9540 in sudoers_audit_open (version=<optimized out>,
conversation=<optimized out>, plugin_printf=<optimized out>,
settings=0x559b286b9830, user_info=0x559b286b5d00, submit_optind=<optimized
out>, submit_argv=0x7ffc61493418, submit_envp=0x7ffc61493430,
plugin_options=0x0, errstr=0x7ffc614931c0) at
../../../plugins/sudoers/audit.c:158
debug_files = {tqh_first = 0x0, tqh_last = 0x7ffc614930c0}
info = {settings = 0x559b286b9830, user_info = 0x559b286b5d00,
plugin_args = 0x0}
cp = <optimized out>
plugin_path = <optimized out>
cur = <optimized out>
ret = <optimized out>
sudo_debug_subsys = 0
__func__ = "sudoers_audit_open"
#6 0x0000559b28448207 in audit_open_int (errstr=0x7ffc614931c0,
submit_envp=0x7ffc61493430, submit_argv=0x7ffc61493418, submit_optind=1,
user_info=0x559b286b5d00, settings=0x559b2846d5c0 <sudo_settings>,
plugin=0x559b286b9a40) at ../../src/sudo.c:1543
plugin_settings = 0x559b286b9830
ret = <optimized out>
sudo_debug_subsys = 576
plugin_settings = <optimized out>
ret = <optimized out>
sudo_debug_subsys = <optimized out>
__func__ = "audit_open_int"
sudo_debug_ret = <optimized out>
sudo_debug_ret = <optimized out>
#7 audit_open (submit_envp=0x7ffc61493430, submit_argv=0x7ffc61493418,
submit_optind=1, user_info=0x559b286b5d00, settings=0x559b2846d5c0
<sudo_settings>) at ../../src/sudo.c:1563
ok = <optimized out>
plugin = 0x559b286b9a40
next = 0x0
errstr = 0x0
sudo_debug_subsys = 576
plugin = <optimized out>
next = <optimized out>
errstr = <optimized out>
sudo_debug_subsys = <optimized out>
__func__ = "audit_open"
ok = <optimized out>
#8 main (argc=<optimized out>, argv=0x7ffc61493418, envp=0x7ffc61493430) at
../../src/sudo.c:238
nargc = 1
status = 0
nargv = 0x7ffc61493420
env_add = 0x0
user_info = 0x559b286b5d00
command_info = 0x0
argv_out = 0x0
user_env_out = 0x0
settings = 0x559b2846d5c0 <sudo_settings>
submit_optind = 1
mask = {__val = {0 <repeats 16 times>}}
__func__ = "main"
Thread 1 (Thread 0x7ffa72670d00 (LWP 80147)):
#0 0x0000000000000000 in ?? ()
No symbol table info available.
#1 0x00007ffa722fddbc in sudoerserror (s=0x7ffa72324082 "syntax error") at
gram.y:953
fmt = ">>> %s: %s near line %d <<<\n"
oldlocale = 1
sudo_debug_subsys = 0
__func__ = "sudoerserror"
#2 0x00007ffa722fe9dc in sudoersparse () at gram.c:1248
yym = <optimized out>
yyn = <optimized out>
yystate = 23
#3 0x00007ffa722d8657 in sudo_file_parse (nss=0x7ffa7233f500 <sudo_nss_file>)
at ../../../plugins/sudoers/file.c:102
sudo_debug_subsys = 0
__func__ = "sudo_file_parse"
handle = 0x559b286be510
#4 0x00007ffa722ef596 in sudoers_init (info=info@entry=0x7ffc614930d0,
envp=envp@entry=0x7ffc61493430) at ../../../plugins/sudoers/sudoers.c:207
nss = 0x7ffa7233f500 <sudo_nss_file>
nss_next = 0x0
oldlocale = 0
sources = 0
ret = -1
sudo_debug_subsys = 0
__func__ = "sudoers_init"
#5 0x00007ffa722f9540 in sudoers_audit_open (version=<optimized out>,
conversation=<optimized out>, plugin_printf=<optimized out>,
settings=0x559b286b9830, user_info=0x559b286b5d00, submit_optind=<optimized
out>, submit_argv=0x7ffc61493418, submit_envp=0x7ffc61493430,
plugin_options=0x0, errstr=0x7ffc614931c0) at
../../../plugins/sudoers/audit.c:158
debug_files = {tqh_first = 0x0, tqh_last = 0x7ffc614930c0}
info = {settings = 0x559b286b9830, user_info = 0x559b286b5d00,
plugin_args = 0x0}
cp = <optimized out>
plugin_path = <optimized out>
cur = <optimized out>
ret = <optimized out>
sudo_debug_subsys = 0
__func__ = "sudoers_audit_open"
#6 0x0000559b28448207 in audit_open_int (errstr=0x7ffc614931c0,
submit_envp=0x7ffc61493430, submit_argv=0x7ffc61493418, submit_optind=1,
user_info=0x559b286b5d00, settings=0x559b2846d5c0 <sudo_settings>,
plugin=0x559b286b9a40) at ../../src/sudo.c:1543
plugin_settings = 0x559b286b9830
ret = <optimized out>
sudo_debug_subsys = 576
plugin_settings = <optimized out>
ret = <optimized out>
sudo_debug_subsys = <optimized out>
__func__ = "audit_open_int"
sudo_debug_ret = <optimized out>
sudo_debug_ret = <optimized out>
#7 audit_open (submit_envp=0x7ffc61493430, submit_argv=0x7ffc61493418,
submit_optind=1, user_info=0x559b286b5d00, settings=0x559b2846d5c0
<sudo_settings>) at ../../src/sudo.c:1563
ok = <optimized out>
plugin = 0x559b286b9a40
next = 0x0
errstr = 0x0
sudo_debug_subsys = 576
plugin = <optimized out>
next = <optimized out>
errstr = <optimized out>
sudo_debug_subsys = <optimized out>
__func__ = "audit_open"
ok = <optimized out>
#8 main (argc=<optimized out>, argv=0x7ffc61493418, envp=0x7ffc61493430) at
../../src/sudo.c:238
nargc = 1
status = 0
nargv = 0x7ffc61493420
env_add = 0x0
user_info = 0x559b286b5d00
command_info = 0x0
argv_out = 0x0
user_env_out = 0x0
settings = 0x559b2846d5c0 <sudo_settings>
submit_optind = 1
mask = {__val = {0 <repeats 16 times>}}
__func__ = "main"
8<---------------------------------8<---------------------------------8<---------------------------------8<---------------------------------
sudo --version
Sudo version 1.9.1
Configure options: --build=x86_64-linux-gnu --prefix=/usr
--includedir=${prefix}/include --mandir=${prefix}/share/man
--infodir=${prefix}/share/info --sysconfdir=/etc --localstatedir=/var
--disable-option-checking --disable-silent-rules
--libdir=${prefix}/lib/x86_64-linux-gnu
--libexecdir=${prefix}/lib/x86_64-linux-gnu --disable-maintainer-mode
--disable-dependency-tracking -v --with-all-insults --with-pam --with-fqdn
--with-logging=syslog --with-logfac=authpriv --with-env-editor --with-
editor=/usr/bin/editor --with-exampledir=/usr/share/doc/sudo/examples --with-
timeout=15 --with-password-timeout=0 --with-passprompt=[sudo] password for %p:
--disable-root-mailer --with-sendmail=/usr/sbin/sendmail --with-
rundir=/run/sudo --libexecdir=/usr/lib --with-sssd --with-sssd-
lib=/usr/lib/x86_64-linux-gnu --with-selinux --with-linux-audit --enable-
tmpfiles.d=yes
Sudoers policy plugin version 1.9.1
Sudoers file grammar version 48
Sudoers path: /etc/sudoers
Authentication methods: 'pam'
Syslog facility if syslog is being used for logging: authpriv
Syslog priority to use when user authenticates successfully: notice
Syslog priority to use when user authenticates unsuccessfully: alert
Send mail if user authentication fails
Send mail if the user is not in sudoers
Lecture user the first time they run sudo
Require users to authenticate by default
Root may run sudo
Allow some information gathering to give useful error messages
Require fully-qualified hostnames in the sudoers file
Visudo will honor the EDITOR environment variable
Set the LOGNAME and USER environment variables
Length at which to wrap log file lines (0 for no wrap): 80
Authentication timestamp timeout: 15.0 minutes
Password prompt timeout: 0.0 minutes
Number of tries to enter a password: 3
Umask to use or 0777 to use user's: 022
Path to mail program: /usr/sbin/sendmail
Flags for mail program: -t
Address to send mail to: root
Subject line for mail messages: *** SECURITY information for %h ***
Incorrect password message: Sorry, try again.
Path to lecture status dir: /var/lib/sudo/lectured
Path to authentication timestamp dir: /run/sudo/ts
Default password prompt: [sudo] password for %p:
Default user to run commands as: root
Value to override user's $PATH with:
/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
Path to the editor for use by visudo: /usr/bin/editor
When to require a password for 'list' pseudocommand: any
When to require a password for 'verify' pseudocommand: all
File descriptors >= 3 will be closed before executing a command
Reset the environment to a default set of variables
Environment variables to check for sanity:
TZ
TERM
LINGUAS
LC_*
LANGUAGE
LANG
COLORTERM
Environment variables to remove:
*=()*
RUBYOPT
RUBYLIB
PYTHONUSERBASE
PYTHONINSPECT
PYTHONPATH
PYTHONHOME
TMPPREFIX
ZDOTDIR
READNULLCMD
NULLCMD
FPATH
PERL5DB
PERL5OPT
PERL5LIB
PERLLIB
PERLIO_DEBUG
JAVA_TOOL_OPTIONS
SHELLOPTS
BASHOPTS
GLOBIGNORE
PS4
BASH_ENV
ENV
TERMCAP
TERMPATH
TERMINFO_DIRS
TERMINFO
_RLD*
LD_*
PATH_LOCALE
NLSPATH
HOSTALIASES
RES_OPTIONS
LOCALDOMAIN
CDPATH
IFS
Environment variables to preserve:
XAUTHORIZATION
XAUTHORITY
PS2
PS1
PATH
LS_COLORS
KRB5CCNAME
HOSTNAME
DPKG_COLORS
DISPLAY
COLORS
Locale to use while parsing sudoers: C
Directory in which to store input/output logs: /var/log/sudo-io
File in which to store the input/output log: %{seq}
Add an entry to the utmp/utmpx file when allocating a pty
PAM service name to use: sudo
PAM service name to use for login shells: sudo
Attempt to establish PAM credentials for the target user
Create a new PAM session for the command to run in
Perform PAM account validation management
Enable sudoers netgroup support
Check parent directories for writability when editing files with sudoedit
Allow commands to be run even if sudo cannot write to the audit log
Allow commands to be run even if sudo cannot write to the log file
Log entries larger than this value will be split into multiple syslog messages:
960
File mode to use for the I/O log files: 0600
Execute commands by file descriptor instead of by path: digest_only
Type of authentication timestamp record: tty
Ignore case when matching user names
Ignore case when matching group names
Log when a command is allowed by sudoers
Log when a command is denied by sudoers
Sudo log server timeout in seconds: 30
Enable SO_KEEPALIVE socket option on the socket connected to the logserver
Verify that the log server's certificate is valid
Set the pam remote user to the user running sudo
Local IP address and netmask pairs:
192.168.1.190/255.255.255.0
fe80::9049:55ff:fed5:2654/ffff:ffff:ffff:ffff::
Sudoers I/O plugin version 1.9.1
Sudoers audit plugin version 1.9.1
8<---------------------------------8<---------------------------------8<---------------------------------8<---------------------------------
I have reported this upstream at https://bugzilla.sudo.ws/show_bug.cgi?id=934
-- System Information:
Debian Release: bullseye/sid
APT prefers unstable-debug
APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 5.7.0-1-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_USER
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages sudo depends on:
ii libaudit1 1:2.8.5-3+b1
ii libc6 2.30-8
ii libpam-modules 1.3.1-5
ii libpam0g 1.3.1-5
ii libselinux1 3.0-1+b3
ii lsb-base 11.1.0
sudo recommends no packages.
sudo suggests no packages.
-- Configuration Files:
/etc/sudoers [Errno 13] Permission denied: '/etc/sudoers'
/etc/sudoers.d/README [Errno 13] Permission denied: '/etc/sudoers.d/README'
-- no debconf information
--- End Message ---
--- Begin Message ---
Joachim Bauernberger <joachim.bauernber...@protonmail.ch> writes:
> Package: sudo
> Version: 1.9.1-1
> Severity: critical
> Justification: breaks unrelated software
>
> Dear Maintainer,
>
> Hi there,
>
> when uncommenting the "include" directive in /etc/sudoers:
>
> includedir /etc/sudoers.d
>
> then sudo crashes with a segmentation fault (stacktrace generated on
> debian/unstable -- see version info below this stacktrace):
That line was not a comment, it was a directive. Put the # back at the
start of the line, or replace it with an @, and things will work fine.
Please see the "Including other files from within sudoers" section of
the sudoers(5) man page for details.
However, since your but report caused *me* to go read that and realize @
is now preferred to # for that directive, I'm updating the default
sudoers file for Debian to use @. Perhaps that will help reduce this
particular form of confusion in the future.
Bdale
signature.asc
Description: PGP signature
--- End Message ---