Hello, we'll likely have to figure out what other commits we need to
bring in into the Noble patch. But first, some questions. Is this error

user@ubuntu:~$ sudo vi /etc/passwd
free(): double free detected in tcache 2
Aborted (core dumped)

due to the fact that you configured /etc/pam.d/sudo to authenticate
using radius? Does `sudo true` also crash?

It would be helpful to have a reproducer of this crash from a clean
Noble system. Ideally something on these lines:

$ lxc launch ubuntu:noble reprocontainer
$ lxc exec reprocontainer bash
# add-apt-repository ppa:lvoytek/libpam-radius-auth-ipv4-6-yes-no
# apt update && apt install ...
# vim /etc/pam.d/..., remove X, add Y
# sudo ...
[crash!]

Would you be able to come up with something like that and share it?

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068729

Title:
  pam_radius_auth: Failed to open RADIUS IPv6 socket: Address family not
  supported by protocol

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libpam-radius-auth/+bug/2068729/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to