Package: libpam-ssh-agent-auth
Version: 0.10.2-1.1
Severity: important
Tags: upstream

When the file referenced in the SSH_AUTH_SOCK variable is present but
not serviced by an SSH agent, sudo falls back properly to other PAM
methods (eg. password entry), and then fails with
    [sudo] password for root: 
    sudo: unable to change to root gid: Operation not permitted
    sudo: unable to send audit message: Operation not permitted
    zsh: segmentation fault  sudo ls
, and so does su:

    Password: 
    setgid: Operation not permitted


I can not explain how this situation occurs naturally, but it did for me
(before I could debug it in detail), and can easily be reproduced with
    $ export SSH_AUTH_SOCK=/tmp/fake
    $ touch $SSH_AUTH_SOCK
.

The situation can be worked around by deleting the stale auth sock and
unsetting the environment variable, but this should be drilled down into
by libpam-ssh-agent-auth.

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.7.0-rc1+ (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages libpam-ssh-agent-auth:amd64 depends on:
ii  libc6        2.22-9
ii  libpam0g     1.1.8-3.2
ii  libssl1.0.2  1.0.2h-1

libpam-ssh-agent-auth:amd64 recommends no packages.

libpam-ssh-agent-auth:amd64 suggests no packages.

-- no debconf information

-- 
To use raw power is to make yourself infinitely vulnerable to greater powers.
  -- Bene Gesserit axiom

Attachment: signature.asc
Description: PGP signature

Reply via email to