You have been subscribed to a public bug:

Binary package hint: gnome-system-tools

gnome-system-tools relies on PolicyKit to check privileges, and
PolicyKit-gnome 0.6 requires reading /proc/$pid/exe to know the
executable binary path, however this is what I get when running any
g-s-t tool (didn't see it with other executables):

$ ps -ef | grep "network-admin"
carlos    9385  8497  0 20:35 pts/1    00:00:00 ./network-admin
$ ls -l /proc/9385/exe
ls: cannot read symbolic link /proc/9385/exe: Permission denied
lrwxrwxrwx 1 root root 0 2008-01-07 20:36 /proc/9385/exe

When pressing the "unlock" button, PolicyKit-gnome should show a dialog
to ask for the user/admin password, but due to these permissions, it
fails, g-s-t was incorrectly interpreting the error as a successful
reply (fixed in svn trunk), but there's clearly a much bigger underlying
problem, so the possible solutions are:

1) Check where does the /proc/$pid entry for g-s-t tools get such permissions 
and unpatch/fix it
2) Update to PolicyKit 0.7, where the exec path isn't anymore a hard requirement

I'm reporting it to the g-s-t package as it's where it's visible

** Affects: gnome-system-tools (Ubuntu)
     Importance: High
     Assignee: Ubuntu Desktop Bugs (desktop-bugs)
         Status: Confirmed

-- 
/proc/$pid/* gets too restrictive permissions for g-s-t tools
https://bugs.edge.launchpad.net/bugs/181088
You received this bug notification because you are a member of Ubuntu Desktop 
Bugs, which is a bug assignee.

-- 
desktop-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs

Reply via email to