Bug ID 1191642
Summary gdm-session-worker crashing when pam_mount is used with ad-user (winbind)
Classification openSUSE
Product openSUSE Tumbleweed
Version Current
Hardware x86-64
OS Other
Status NEW
Severity Major
Priority P5 - None
Component GNOME
Assignee gnome-bugs@suse.de
Reporter philip.raets@telenet.be
QA Contact qa-bugs@suse.de
Found By ---
Blocker ---

After latest update of Tumbleweed to Tumbleweed snapshot 20211011, I can't log
in anymore when using pam_mount with my active directory user through winbind:
gdm-session-worker is crashing.

I've had created a symlink /etc/pam.d/gdm-password to /etc/pam.d/gdm

/etc/pam.d/gdm contains:
#%PAM-1.0
# GDM PAM standard configuration (with passwords)
auth     optional       pam_mount.so
auth     requisite      pam_nologin.so
auth     include        common-auth
account  include        common-account
password include        common-password
session  required       pam_loginuid.so
session  optional       pam_keyinit.so force revoke
session  include        common-session
session  [success=1 default=ignore]     pam_succeed_if.so       service =
systemd-user quiet
session  optional       pam_mount.so

Which always worked before Tumbleweed 20211011

After the update I cannot login anymore, and I have the following in my
journalctl:

okt 14 10:14:22 PRAETS gdm-password][19343]: pam_winbind(gdm-password:auth):
getting password (0x00000390)
okt 14 10:14:22 PRAETS gdm-password][19343]: pam_winbind(gdm-password:auth):
pam_get_item returned a password
okt 14 10:14:22 PRAETS gdm-password][19343]: pam_winbind(gdm-password:auth):
user 'praets' granted access
okt 14 10:14:22 PRAETS gdm-password][19343]: pam_winbind(gdm-password:account):
user 'praets' granted access
okt 14 10:14:22 PRAETS systemd-logind[882]: New session 5 of user praets.
okt 14 10:14:22 PRAETS systemd[1]: Started Session 5 of User praets.
okt 14 10:14:22 PRAETS gdm-password][19343]: pam_unix(gdm-password:session):
session opened for user praets(uid=22690) by (uid=0)
okt 14 10:14:22 PRAETS gdm-password][19343]: gkr-pam: gnome-keyring-daemon
started properly and unlocked keyring
okt 14 10:14:22 PRAETS gdm-session-worker[19343]: free(): double free detected
in tcache 2
okt 14 10:14:22 PRAETS systemd[1]: Started Process Core Dump (PID 19364/UID 0).
okt 14 10:14:23 PRAETS systemd-coredump[19365]: [


You are receiving this mail because: