Package: schroot Version: 1.6.10-12 Severity: important X-Debbugs-Cc: ser...@vlasov.me
Dear Maintainer, When doing schroot into a buster chroot environment, sudo commands fail due to password not matching the current user password. There is no such problem for bullseye chroot environment. To reproduce: 0. make sure your current user belongs to sudo group 1. create buster chroot environment: $ sudo debootstrap buster /schroot-bug/buster 2. create schroot configuration file: $ cat << EOF | sudo tee /etc/schroot/chroot.d/buster [buster] type=directory directory=/schroot-bug/buster users=$USER profile=desktop personality=linux preserve-environment=false EOF 3. enter chroot: $ schroot -c buster 4. test sudo with your current password: $ sudo true [sudo] password for <your user name>: Sorry, try again. [sudo] password for <your user name>: Sorry, try again. [sudo] password for <your user name>: sudo: 3 incorrect password attempts 5. repeat steps 1-4 but replace `buster` with `bullseye`. `sudo true` command accepts the current user password. -- System Information: Debian Release: 11.0 APT prefers stable APT policy: (900, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-8-amd64 (SMP w/8 CPU threads) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages schroot depends on: ii libboost-filesystem1.74.0 1.74.0-9 ii libboost-iostreams1.74.0 1.74.0-9 ii libboost-program-options1.74.0 1.74.0-9 ii libc6 2.31-13 ii libgcc-s1 10.2.1-6 ii libpam0g 1.4.0-9 ii libstdc++6 10.2.1-6 ii libuuid1 2.36.1-8 ii lsb-base 11.1.0 ii schroot-common 1.6.10-12 schroot recommends no packages. Versions of packages schroot suggests: pn aufs-tools | unionfs-fuse <none> pn btrfs-progs <none> ii debootstrap 1.0.123 ii lvm2 2.03.11-2.1 pn qemu-user-static <none> pn zfsutils-linux <none> -- no debconf information