http://bugzilla.opensuse.org/show_bug.cgi?id=1191642 Bug ID: 1191642 Summary: gdm-session-worker crashing when pam_mount is used with ad-user (winbind) Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: x86-64 OS: Other Status: NEW Severity: Major Priority: P5 - None Component: GNOME Assignee: gnome-bugs@suse.de Reporter: philip.raets@telenet.be QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- After latest update of Tumbleweed to Tumbleweed snapshot 20211011, I can't log in anymore when using pam_mount with my active directory user through winbind: gdm-session-worker is crashing. I've had created a symlink /etc/pam.d/gdm-password to /etc/pam.d/gdm /etc/pam.d/gdm contains: #%PAM-1.0 # GDM PAM standard configuration (with passwords) auth optional pam_mount.so auth requisite pam_nologin.so auth include common-auth account include common-account password include common-password session required pam_loginuid.so session optional pam_keyinit.so force revoke session include common-session session [success=1 default=ignore] pam_succeed_if.so service = systemd-user quiet session optional pam_mount.so Which always worked before Tumbleweed 20211011 After the update I cannot login anymore, and I have the following in my journalctl: okt 14 10:14:22 PRAETS gdm-password][19343]: pam_winbind(gdm-password:auth): getting password (0x00000390) okt 14 10:14:22 PRAETS gdm-password][19343]: pam_winbind(gdm-password:auth): pam_get_item returned a password okt 14 10:14:22 PRAETS gdm-password][19343]: pam_winbind(gdm-password:auth): user 'praets' granted access okt 14 10:14:22 PRAETS gdm-password][19343]: pam_winbind(gdm-password:account): user 'praets' granted access okt 14 10:14:22 PRAETS systemd-logind[882]: New session 5 of user praets. okt 14 10:14:22 PRAETS systemd[1]: Started Session 5 of User praets. okt 14 10:14:22 PRAETS gdm-password][19343]: pam_unix(gdm-password:session): session opened for user praets(uid=22690) by (uid=0) okt 14 10:14:22 PRAETS gdm-password][19343]: gkr-pam: gnome-keyring-daemon started properly and unlocked keyring okt 14 10:14:22 PRAETS gdm-session-worker[19343]: free(): double free detected in tcache 2 okt 14 10:14:22 PRAETS systemd[1]: Started Process Core Dump (PID 19364/UID 0). okt 14 10:14:23 PRAETS systemd-coredump[19365]: [ -- You are receiving this mail because: You are on the CC list for the bug.