Public bug reported:

For a while using sudo is not a problem but suddenly it starts failing
every time with:

sudo: pam_mount.c:417: modify_pm_count: Assertion `user != ((void *)0)'
failed.

It just happened *during* an "apt-get dist-upgrade".  A reboot is
necessary to recover the ability to sudo.

This seems to be the same problem as the upstream bug
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=648698 "sudo: calls
pam_close_session without prior pam_open_session"

I changed my /etc/security/pam_mount.conf.xml according to this (German) howto 
http://wiki.ubuntuusers.de/Daten_verschl%C3%BCsseln#luks
The file is attached to this bug, as well as an strace of sudo.

ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: libpam-mount 2.10-2build1
ProcVersionSignature: Ubuntu 3.2.0-19.30-generic 3.2.11
Uname: Linux 3.2.0-19-generic x86_64
ApportVersion: 1.94.1-0ubuntu2
Architecture: amd64
Date: Wed Mar 21 12:43:58 2012
InstallationMedia: Lubuntu 12.04 "Precise Pangolin" - Alpha amd64 (20120201.1)
ProcEnviron:
 LANGUAGE=en_GB:en
 TERM=xterm
 PATH=(custom, user)
 LANG=en_GB.UTF-8
 SHELL=/usr/bin/fizsh
SourcePackage: libpam-mount
UpgradeStatus: No upgrade log present (probably fresh install)
mtime.conffile..etc.security.pam.mount.conf.xml: 2012-03-20T22:28:41.812564

** Affects: sudo (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug precise

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/961101

Title:
  sudo crashes with pam_mount.c:417: modify_pm_count: Assertion `user !=
  ((void *)0)' failed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/961101/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to