Home > Sudo Unable > Sudo Unable To Execute ./configure Success

Sudo Unable To Execute ./configure Success

SUDO_UID Set to the user ID of the user who invoked sudo. Search this Thread 07-17-2009, 01:02 AM #1 d_girish_d LQ Newbie Registered: Jul 2009 Posts: 2 Rep: Getting error "sudo: unable to execute ./setup: Success" Hi, I am trying to Not all security policies support credential caching. -l, --list If no command is specified, list the allowed (and forbidden) commands for the invoking user (or the user specified by the -U So am I.

But why doesn't sudo(8) say so instead of lying and calling it a "Success"? When I run the first command I get several Ign precise InRelease and Err precise release.gpg Unable to connect to It works fine to wget But we still can -- and thus actually increase the size of our env and still be able to exec(3) other commands: $ env | wc -c 132021 $ export FOO=1 If no command is specified, an interactive shell is executed. -t type, --type=type Run the command with an SELinux security context that includes the specified type.

share|improve this answer answered Nov 22 '10 at 21:32 guinoise Commands he gave work perfectly fine for me with sudo so it probably isn't the case. –maarons Nov 22 The policy may require that users authenticate themselves with a password or another authentication mechanism. The sudoers policy allows UIDs that are not in the password database as long as the targetpw option is not set.

View Responses Resources Overview Security Blog Security Measurement Severity Ratings Backporting Policies Product Signing (GPG) Keys Discussions Red Hat Enterprise Linux Red Hat Virtualization Red Hat Satellite Customer Portal Private Groups Could you please rephrase and > > show it with logs again? > > > > If you are using SSSD's sudo integration against IPA server, then here > > is Tango Icons Tango Desktop Project. So, I gave up and logged in as root and tried: find readme* -not -perm -o+r -exec chmod +r {} \; This time it worked.

Notices Welcome to, a friendly and active Linux Community. Root typically has rather minimal privileges in such directories. vBulletin 2000 - 2016, Jelsoft Enterprises Ltd. By default, the sudoers policy will initialize the group vector to the list of groups the target user is a member of.

more stack exchange communities company blog Stack Exchange Inbox Reputation and Badges sign up log in tour help Tour Start here for a quick overview of the site Help Center Detailed But... How to find the total time I spent on my laptop in this year? Please see the EXAMPLES section for more information.

With your permission, may I edit your question later to make it a more generic "I have a proxy but apt-get doesn't work" -- I've seen lots of people behind corporate Why? SUDO_GID Set to the group ID of the user who invoked sudo. UNIX is a registered trademark of The Open Group.

CAVEATS There is no easy way to prevent a user from gaining a root shell if that user is allowed to run arbitrary commands via sudo. The sudoers policy subjects variables passed on the command line to the same restrictions as normal environment variables with one important exception. In lieu of a path name, the string "sudoedit" is used when consulting the security policy. Password Linux - Software This forum is for Software issues.

The sudoers policy only permits use of the -C option when the administrator has enabled the closefrom_override option. -c class, --login-class=class Run the command with resource limits and scheduling priority of Click Here to receive this Complete Guide absolutely free. If no type is specified, the default type is derived from the role. -U user, --other-user=user Used in conjunction with the -l option to list the privileges for user instead of have a peek here Note, however, that this check only applies to the command run by sudo and not any other processes that the command may create.

Some security policies may restrict UIDs to those listed in the password database. When did you last reboot? The default security policy is sudoers, which is configured via the file /etc/sudoers, or via LDAP.

The following parameters may be specified by security policy: real and effective user ID real and effective group ID supplementary group IDs the environment list current working directory file creation mode

I ran it through dos2unix and it fixed it right up. Are you doing this in the folder where setup is found? 2. EXIT VALUE Upon successful execution of a program, the exit status from sudo will simply be the exit status of the program that was executed. Explore Labs Configuration Deployment Troubleshooting Security Additional Tools Red Hat Access plug-ins Red Hat Satellite Certificate Tool Red Hat Insights Increase visibility into IT operations to detect and resolve technical issues

If the -A (askpass) option is specified, a (possibly graphical) helper program is executed to read the user's password and output the password to the standard output. Is setup marked as executable? Does a byte contain 8 bits, or 9? Now we've finally gotten somewhere.

If the SUDO_ASKPASS environment variable is set, it specifies the path to the helper program. What are those "sticks" on Jyn Erso's back? I have forgotten what the puzzle was Has Darth Vader ever been exposed to the vacuum of space? There were hidden ^M characters and the interpreter was reading it as part of the shebang line.

For me to fix it while running Xubuntu 14.04.3 LTS, I installed dos2unix and converted the script's encoding and then ran the script again using sudo and it worked fine. Note that unlike most commands run by sudo, the editor is run with the invoking user's environment unmodified. How would people living in eternal day learn that stars exist? This option is only available on systems with BSD login classes. -E, --preserve-env Indicates to the security policy that the user wishes to preserve their existing environment variables.