|
Bugzilla – Full Text Bug Listing |
| Summary: | Strange 'nosuid' error message with systemd's PrivateDevices | ||
|---|---|---|---|
| Product: | Sudo | Reporter: | Pas <pasthelod> |
| Component: | Sudo | Assignee: | Todd C. Miller <Todd.Miller> |
| Status: | RESOLVED INVALID | ||
| Severity: | normal | ||
| Priority: | low | ||
| Version: | 1.8.19 | ||
| Hardware: | PC | ||
| OS: | Linux | ||
|
Description
Pas
2017-01-11 18:13:57 MST
This doesn't sound like a sudo bug. Sudo gives this message when it is run with an effective uid that is not 0. It will then check the permissions and owner on the sudo binary if possible. The message you received is what you get when the owner and permissions look OK but sudo is still being run with the wrong uid. I don't know why systemd's PrivateDevices would affect this, I would expect that behavior from NoNewPrivileges instead. I'm also not sure why you would want to use sudo here instead of just setting the User and Group in the service file to what is needed to run the command. Thank you for the very quick response!
This is a reduced version of the Redis Sentinel service file. It doesn't really need anything other than executing a script that manages the HA Virtual IP - so it calls /sbin/ip addr {add,del} ... and arping for gratuitous ARP.
Okay, so sudo can't do anything, since it's not euid 0 (that is the +s flag had no effect). Alas the output from mount looks completely unexpected (minus the read only flag on /).
Jan 12 01:53:25 gw01 systemd[1]: Starting test-test.service...
Jan 12 01:53:25 gw01 bash[10967]: /dev/vda2 on / type ext4 (ro,relatime,errors=remount-ro,data=ordered)
Jan 12 01:53:25 gw01 bash[10967]: tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=404680k,mode=755)
... and so on.
Thanks again!
Closing since this doesn't appear to be a sudo issue. |