tags #963197 unreproducible
severity #963197 normal
thanks

Hi Michael,

On Sat, Jun 20, 2020 at 12:06:52PM +0000, Michael Paoli wrote:
> * justification for Severity: (>=) important:
>   Broken in buster (stable) (at least 1.8.27-1+deb10u2).

I don't agree with that justification, reducing to normal. This issue is
unlikely to be fixed in buster.

> * What led up to the situation?
>   stretch (oldstable) --> buster (stable) upgrade.
>   Bug apparently from upstream (apparently fixed in upstream 1.8.28).
>   $ sudo -l fails where it used to work

Works for me:

|[2/2568]mh@testbuster83:~ $ sudo -l
|Matching Defaults entries for mh on testbuster83:
|    env_reset, mail_badpass,
|    
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
|
|User mh may run the following commands on testbuster83:
|    (ALL : ALL) ALL
|[3/2568]mh@testbuster83:~ $


> * What exactly did you do (or not do) that was effective (or ineffective)?
>   Not fix, but work-around, change sudoers, e.g. to include:
>   # listpw=never bug work-around:
>   # Defaults listpw = never
>   Defaults listpw = any
>   ALL ALL=(nobody:nogroup) NOPASSWD: /bin/true ""
> 
> * What was the outcome of this action?
>   fails:
>   sudoers: Defaults listpw=never
>   $ sudo -l
>   Above noted work-around is effective but adds spurious additional sudo
>   command.
> 
> * What outcome did you expect instead?
>   Should work:
>   sudoers: Defaults listpw=never
>   $ sudo -l

I cannot make sense of that. What exactly does sudo not do as
documented?

Can you please verify that sudo 1.9.5p2 in bullseye/sid performs as
expected? If you don't reply, I plan to close this issue by the end of
April 2021.

Greetings
Marc

Reply via email to