Bug 1905774
Summary: | Since last serie of updates, sudo and su are broken | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | David Hill <dhill> |
Component: | sudo | Assignee: | Radovan Sroka <rsroka> |
Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | urgent | Docs Contact: | |
Priority: | unspecified | ||
Version: | rawhide | CC: | alakatos, bberg, kzak, mattdm, nerijus, rsroka, siddharth, tosykora, zfridric |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-12-10 15:17:40 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
David Hill
2020-12-09 03:20:26 UTC
[ 403.864584] sudo[5194]: segfault at 0 ip 00007f291015a2d5 sp 00007ffc31ba1758 error 4 in libc-2.32.9000.so[7f291001f000+14e000] 2020-12-08T21:34:06-0500 SUBDEBUG Upgrade: glibc-all-langpacks-2.32.9000-19.fc34.x86_64 2020-12-08T21:34:08-0500 SUBDEBUG Upgrade: glibc-common-2.32.9000-19.fc34.x86_64 2020-12-08T21:34:08-0500 SUBDEBUG Upgrade: glibc-langpack-en-2.32.9000-19.fc34.x86_64 2020-12-08T21:34:08-0500 SUBDEBUG Upgrade: glibc-2.32.9000-19.fc34.x86_64 2020-12-08T21:34:15-0500 SUBDEBUG Upgrade: glibc-headers-x86-2.32.9000-19.fc34.noarch 2020-12-08T21:34:16-0500 SUBDEBUG Upgrade: glibc-devel-2.32.9000-19.fc34.x86_64 2020-12-08T21:34:22-0500 SUBDEBUG Upgrade: glibc-2.32.9000-19.fc34.i686 2020-12-08T21:34:22-0500 SUBDEBUG Upgraded: glibc-devel-2.32.9000-18.fc34.x86_64 2020-12-08T21:34:22-0500 SUBDEBUG Upgraded: glibc-2.32.9000-18.fc34.i686 2020-12-08T21:34:22-0500 SUBDEBUG Upgraded: glibc-headers-x86-2.32.9000-18.fc34.noarch 2020-12-08T21:34:24-0500 SUBDEBUG Upgraded: glibc-all-langpacks-2.32.9000-18.fc34.x86_64 2020-12-08T21:34:24-0500 SUBDEBUG Upgraded: glibc-common-2.32.9000-18.fc34.x86_64 2020-12-08T21:34:24-0500 SUBDEBUG Upgraded: glibc-langpack-en-2.32.9000-18.fc34.x86_64 2020-12-08T21:34:24-0500 SUBDEBUG Upgraded: glibc-2.32.9000-18.fc34.x86_64 hi this is duplicate of https://bugzilla.redhat.com/show_bug.cgi?id=1905667 Let me see if masking fprintd.service helps. It does help... now I have this : ~~~ [dhill@knox ~]$ sudo -i [sudo] password for dhill: dhill is not in the sudoers file. This incident will be reported. ~~~ which is ... better . But, pam_fprintd is configured as auth sufficient pam_fprintd.so in pam. Shouldn't that mean that even if it rejects the authentication attempt, you can still continue with another method? Seems to be a duplicate of #1906066 *** This bug has been marked as a duplicate of bug 1906066 *** |