[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-12-19 Thread Launchpad Bug Tracker
This bug was fixed in the package sudo - 1.7.2p1-1ubuntu5.5

---
sudo (1.7.2p1-1ubuntu5.5) lucid-proposed; urgency=low

  * toke.{cl}: avoid duplicate fclose() of the sudoers file (LP: #553786)
- http://www.sudo.ws/repos/sudo/rev/164d39108dde
 -- Marc Deslauriers marc.deslauri...@ubuntu.com   Thu, 22 Nov 2012 16:08:01 
-0500

** Changed in: sudo (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-12-17 Thread Bartosz Kosiorek
After installing sudo package from proposed, there is no longer crash:

sudo ls
sudo: /etc/sudoers.d/mama is mode 0644, should be 0440
 /etc/sudoers.d/README: /etc/sudoers.d/mama near line 18 
sudo: parse error in /etc/sudoers.d/README near line 18
sudo: no valid sudoers sources found, quitting

Verified.

** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-11-26 Thread Adam Conrad
Hello Daniel, or anyone else affected,

Accepted sudo into lucid-proposed. The package will build now and be
available at http://launchpad.net/ubuntu/+source/sudo/1.7.2p1-1ubuntu5.5
in a few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed.  Your feedback will aid us getting this update
out to other Ubuntu users.

If this package fixes the bug for you, please change the bug tag from
verification-needed to verification-done.  If it does not, change the
tag to verification-failed.  In either case, details of your testing
will help us make a better decision.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance!

** Changed in: sudo (Ubuntu Lucid)
   Status: Confirmed = Fix Committed

** Tags added: verification-needed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-11-26 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/sudo

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-11-22 Thread Rüdiger Kupper
I have been hit by this bug and it's *extremely nasty*. I am instantly
locked out of my system with no way of fixing it.

Things like these MUST NOT happen. I get from this bugreport that there
is a fix.

BACKPORT THIS FIX TO LUCID!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-11-22 Thread Marc Deslauriers
Upstream fix: http://www.sudo.ws/repos/sudo/rev/164d39108dde


** Also affects: sudo (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Changed in: sudo (Ubuntu Lucid)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-11-22 Thread Marc Deslauriers
** Description changed:

- Binary package hint: sudo
+ [SRU]
  
- Lucid beta1, sudo 1.7.2p1-1ubuntu4. I added a file with incorrect
- permissions under /etc/sudoers.d/, and while that needed fixing, sudo(8)
- certainly shouldn't react like this:
+ [Impact]
+ Lucid users who create a file in /etc/sudoers.d with incorrect permissions 
cause sudo to segfault, preventing them from using sudo to change the 
permissions.
+ 
+ [Test case]
+ 1- Create a file in /etc/sudoers.d with 644 permissions
+ 2- Attempt to use sudo
+ 3- sudo should simply print a warning, and not segfault
+ 
+ [Regression potental]
+ This is the upstream patch that has been used for quite a while, and has 
passed the qa-regression-testing test suite. If there are regressions, I 
suppose it could be in the sudoers file handling.
+ 
+ 
+ Original description:
+ Lucid beta1, sudo 1.7.2p1-1ubuntu4. I added a file with incorrect permissions 
under /etc/sudoers.d/, and while that needed fixing, sudo(8) certainly 
shouldn't react like this:
  
  $ sudo bash
  sudo: /etc/sudoers.d/admin is mode 0644, should be 0440
   /etc/sudoers.d/README: /etc/sudoers.d/admin near line 18 
  sudo: parse error in /etc/sudoers.d/README near line 18
  sudo: no valid sudoers sources found, quitting
  *** glibc detected *** sudo: double free or corruption (!prev): 0x0861b7b0 ***
  === Backtrace: =
  /lib/tls/i686/cmov/libc.so.6(+0x6b581)[0xa3a581]
  /lib/tls/i686/cmov/libc.so.6(+0x6cdd8)[0xa3bdd8]
  /lib/tls/i686/cmov/libc.so.6(cfree+0x6d)[0xa3eebd]
  /lib/tls/i686/cmov/libc.so.6(fclose+0x14a)[0xa2aa9a]
  sudo[0x805782d]
  sudo[0x80587c6]
  sudo[0x805639e]
  sudo[0x805a104]
  /lib/tls/i686/cmov/libc.so.6(__libc_start_main+0xe6)[0x9e5bd6]
  sudo[0x804a7c1]
  === Memory map: 
  002b1000-002b7000 r-xp  08:07 16579  
/lib/tls/i686/cmov/libnss_compat-2.11.1.so
  002b7000-002b8000 r--p 6000 08:07 16579  
/lib/tls/i686/cmov/libnss_compat-2.11.1.so
  002b8000-002b9000 rw-p 7000 08:07 16579  
/lib/tls/i686/cmov/libnss_compat-2.11.1.so
  003bf000-003c9000 r-xp  08:07 16581  
/lib/tls/i686/cmov/libnss_files-2.11.1.so
  003c9000-003ca000 r--p 9000 08:07 16581  
/lib/tls/i686/cmov/libnss_files-2.11.1.so
  003ca000-003cb000 rw-p a000 08:07 16581  
/lib/tls/i686/cmov/libnss_files-2.11.1.so
  0045f000-00467000 r-xp  08:07 16583  
/lib/tls/i686/cmov/libnss_nis-2.11.1.so
  00467000-00468000 r--p 7000 08:07 16583  
/lib/tls/i686/cmov/libnss_nis-2.11.1.so
  00468000-00469000 rw-p 8000 08:07 16583  
/lib/tls/i686/cmov/libnss_nis-2.11.1.so
  00542000-0055f000 r-xp  08:07 16364  /lib/libgcc_s.so.1
  0055f000-0056 r--p 0001c000 08:07 16364  /lib/libgcc_s.so.1
  0056-00561000 rw-p 0001d000 08:07 16364  /lib/libgcc_s.so.1
  0060b000-0060c000 r-xp  00:00 0  [vdso]
  006e6000-006e8000 r-xp  08:07 16575  
/lib/tls/i686/cmov/libdl-2.11.1.so
  006e8000-006e9000 r--p 1000 08:07 16575  
/lib/tls/i686/cmov/libdl-2.11.1.so
  006e9000-006ea000 rw-p 2000 08:07 16575  
/lib/tls/i686/cmov/libdl-2.11.1.so
  0084e000-00869000 r-xp  08:07 16304  /lib/ld-2.11.1.so
  00869000-0086a000 r--p 0001a000 08:07 16304  /lib/ld-2.11.1.so
  0086a000-0086b000 rw-p 0001b000 08:07 16304  /lib/ld-2.11.1.so
  008a5000-008ae000 r-xp  08:07 16574  
/lib/tls/i686/cmov/libcrypt-2.11.1.so
  008ae000-008af000 r--p 8000 08:07 16574  
/lib/tls/i686/cmov/libcrypt-2.11.1.so
  008af000-008b rw-p 9000 08:07 16574  
/lib/tls/i686/cmov/libcrypt-2.11.1.so
- 008b-008d7000 rw-p  00:00 0 
+ 008b-008d7000 rw-p  00:00 0
  009cf000-00b22000 r-xp  08:07 16572  
/lib/tls/i686/cmov/libc-2.11.1.so
  00b22000-00b23000 ---p 00153000 08:07 16572  
/lib/tls/i686/cmov/libc-2.11.1.so
  00b23000-00b25000 r--p 00153000 08:07 16572  
/lib/tls/i686/cmov/libc-2.11.1.so
  00b25000-00b26000 rw-p 00155000 08:07 16572  
/lib/tls/i686/cmov/libc-2.11.1.so
- 00b26000-00b29000 rw-p  00:00 0 
+ 00b26000-00b29000 rw-p  00:00 0
  00c5d000-00c68000 r-xp  08:07 16381  /lib/libpam.so.0.82.2
  00c68000-00c69000 r--p a000 08:07 16381  /lib/libpam.so.0.82.2
  00c69000-00c6a000 rw-p b000 08:07 16381  /lib/libpam.so.0.82.2
  00e4f000-00e62000 r-xp  08:07 16578  
/lib/tls/i686/cmov/libnsl-2.11.1.so
  00e62000-00e63000 r--p 00012000 08:07 16578  
/lib/tls/i686/cmov/libnsl-2.11.1.so
  00e63000-00e64000 rw-p 00013000 08:07 16578  
/lib/tls/i686/cmov/libnsl-2.11.1.so
- 00e64000-00e66000 rw-p  00:00 0 
+ 00e64000-00e66000 rw-p  00:00 0
  08048000-08066000 r-xp  08:07 573495 /usr/bin/sudo
  08066000-08067000 r--p 0001d000 08:07 573495 /usr/bin/sudo
  08067000-08068000 rw-p 0001e000 08:07 573495 /usr/bin/sudo
- 08068000-0806b000 rw-p  00:00 0 
+ 08068000-0806b000 rw-p  00:00 0
  08612000-08633000 

[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-04-16 Thread Steve Langasek
This bug appears to be fixed in precise.  A message is output about the
wrong permissions, but sudo itself works correctly.

** Changed in: sudo (Ubuntu)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-04-16 Thread Jason R. Coombs
Has Ubuntu changed its meaning of LTS? This issue still exists in Lucid.

Keith Baker already pointed out that the issue was fixed at least as
early as Natty. Can we get the fix back-ported to Lucid? Is there any
reason this shouldn't be considered critical as it can lock out
legitimate administrative users with no workaround except to run
recovery (in some scenarios)?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-03-23 Thread Jason R. Coombs
I've just been bitten by this bug yet again. I've had to request to my
administrator to reboot our server into recovery mode to remove the
file. Why isn't a bug that locks administrators out of the operating
system (in an otherwise well-configured environment) not considered a
critical bug? The only workaround I can think of is to know in advance
that creating a file in /etc/sudoers.d might cause lockouts, so keep a
separate shell as root... but I don't always remember to do that.

I would be grateful if someone would please fix this.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-01-29 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: sudo (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-01-29 Thread Keith Baker
Tried same thing on desktop version of natty. There the problem seems
fixed.

Still I'd consider this bug critical since lucid is the current long-
term-support version.

** Tags added: lucid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2012-01-29 Thread Keith Baker
Just happened to me on a fresh and updated lucid server installation.

This is really annoying since the server was a plain router. No keyboard
or monitor was connected.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2011-07-18 Thread Carlos Perelló Marín
How do you change the file rights if sudo doesn't work nor you have a
root password set nor you have direct access to the server to reboot
into single mode?

IMHO, this bug should be set as CRITICAL, given that you are banned
from administrate a remote server.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/553786

Title:
  *** glibc detected *** sudo: double free or corruption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/553786/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 553786] Re: *** glibc detected *** sudo: double free or corruption

2010-11-04 Thread Ovidiu Constantin
Confirmed also on Ubuntu 10.4 - 1.7.2p1-1ubuntu5.2 . Changing the file
rights from 644 to 440 fixed it.

-- 
*** glibc detected *** sudo: double free or corruption
https://bugs.launchpad.net/bugs/553786
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs