Hello, we'll likely have to figure out what other commits we need to bring in into the Noble patch. But first, some questions. Is this error
user@ubuntu:~$ sudo vi /etc/passwd free(): double free detected in tcache 2 Aborted (core dumped) due to the fact that you configured /etc/pam.d/sudo to authenticate using radius? Does `sudo true` also crash? It would be helpful to have a reproducer of this crash from a clean Noble system. Ideally something on these lines: $ lxc launch ubuntu:noble reprocontainer $ lxc exec reprocontainer bash # add-apt-repository ppa:lvoytek/libpam-radius-auth-ipv4-6-yes-no # apt update && apt install ... # vim /etc/pam.d/..., remove X, add Y # sudo ... [crash!] Would you be able to come up with something like that and share it? Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2068729 Title: pam_radius_auth: Failed to open RADIUS IPv6 socket: Address family not supported by protocol To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpam-radius-auth/+bug/2068729/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
