[Bug 961101] [NEW] sudo crashes with pam_mount.c:417: modify_pm_count: Assertion `user != ((void *)0)' failed.

Christian Mertes 961101 at bugs.launchpad.net
Wed Mar 21 12:01:36 UTC 2012


Public bug reported:

For a while using sudo is not a problem but suddenly it starts failing
every time with:

sudo: pam_mount.c:417: modify_pm_count: Assertion `user != ((void *)0)'
failed.

It just happened *during* an "apt-get dist-upgrade".  A reboot is
necessary to recover the ability to sudo.

This seems to be the same problem as the upstream bug
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=648698 "sudo: calls
pam_close_session without prior pam_open_session"

I changed my /etc/security/pam_mount.conf.xml according to this (German) howto http://wiki.ubuntuusers.de/Daten_verschl%C3%BCsseln#luks
The file is attached to this bug, as well as an strace of sudo.

ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: libpam-mount 2.10-2build1
ProcVersionSignature: Ubuntu 3.2.0-19.30-generic 3.2.11
Uname: Linux 3.2.0-19-generic x86_64
ApportVersion: 1.94.1-0ubuntu2
Architecture: amd64
Date: Wed Mar 21 12:43:58 2012
InstallationMedia: Lubuntu 12.04 "Precise Pangolin" - Alpha amd64 (20120201.1)
ProcEnviron:
 LANGUAGE=en_GB:en
 TERM=xterm
 PATH=(custom, user)
 LANG=en_GB.UTF-8
 SHELL=/usr/bin/fizsh
SourcePackage: libpam-mount
UpgradeStatus: No upgrade log present (probably fresh install)
mtime.conffile..etc.security.pam.mount.conf.xml: 2012-03-20T22:28:41.812564

** Affects: sudo (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug precise

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/961101

Title:
  sudo crashes with pam_mount.c:417: modify_pm_count: Assertion `user !=
  ((void *)0)' failed.

Status in “sudo” package in Ubuntu:
  New

Bug description:
  For a while using sudo is not a problem but suddenly it starts failing
  every time with:

  sudo: pam_mount.c:417: modify_pm_count: Assertion `user != ((void
  *)0)' failed.

  It just happened *during* an "apt-get dist-upgrade".  A reboot is
  necessary to recover the ability to sudo.

  This seems to be the same problem as the upstream bug
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=648698 "sudo: calls
  pam_close_session without prior pam_open_session"

  I changed my /etc/security/pam_mount.conf.xml according to this (German) howto http://wiki.ubuntuusers.de/Daten_verschl%C3%BCsseln#luks
  The file is attached to this bug, as well as an strace of sudo.

  ProblemType: Bug
  DistroRelease: Ubuntu 12.04
  Package: libpam-mount 2.10-2build1
  ProcVersionSignature: Ubuntu 3.2.0-19.30-generic 3.2.11
  Uname: Linux 3.2.0-19-generic x86_64
  ApportVersion: 1.94.1-0ubuntu2
  Architecture: amd64
  Date: Wed Mar 21 12:43:58 2012
  InstallationMedia: Lubuntu 12.04 "Precise Pangolin" - Alpha amd64 (20120201.1)
  ProcEnviron:
   LANGUAGE=en_GB:en
   TERM=xterm
   PATH=(custom, user)
   LANG=en_GB.UTF-8
   SHELL=/usr/bin/fizsh
  SourcePackage: libpam-mount
  UpgradeStatus: No upgrade log present (probably fresh install)
  mtime.conffile..etc.security.pam.mount.conf.xml: 2012-03-20T22:28:41.812564

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/961101/+subscriptions




More information about the foundations-bugs mailing list