You have been subscribed to a public bug:
Binary package hint: gnome-system-tools
gnome-system-tools relies on PolicyKit to check privileges, and
PolicyKit-gnome 0.6 requires reading /proc/$pid/exe to know the
executable binary path, however this is what I get when running any
g-s-t tool (didn't see it with other executables):
$ ps -ef | grep "network-admin"
carlos 9385 8497 0 20:35 pts/1 00:00:00 ./network-admin
$ ls -l /proc/9385/exe
ls: cannot read symbolic link /proc/9385/exe: Permission denied
lrwxrwxrwx 1 root root 0 2008-01-07 20:36 /proc/9385/exe
When pressing the "unlock" button, PolicyKit-gnome should show a dialog
to ask for the user/admin password, but due to these permissions, it
fails, g-s-t was incorrectly interpreting the error as a successful
reply (fixed in svn trunk), but there's clearly a much bigger underlying
problem, so the possible solutions are:
1) Check where does the /proc/$pid entry for g-s-t tools get such permissions
and unpatch/fix it
2) Update to PolicyKit 0.7, where the exec path isn't anymore a hard requirement
I'm reporting it to the g-s-t package as it's where it's visible
** Affects: gnome-system-tools (Ubuntu)
Importance: High
Assignee: Ubuntu Desktop Bugs (desktop-bugs)
Status: Confirmed
--
/proc/$pid/* gets too restrictive permissions for g-s-t tools
https://bugs.edge.launchpad.net/bugs/181088
You received this bug notification because you are a member of Ubuntu Desktop
Bugs, which is a bug assignee.
--
desktop-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs