Segfault during krb5_set_password

Jonathan Reams jreams at
Mon Apr 16 19:03:45 EDT 2012

We're using the kadm5_hook API (krb5 v1.9.2) to implement password syncing against our active directory (, and kadmind has been segfaulting in krb5_set_password when a principal's keys are randomized - e.g. during ank -randkey or cpw -randkey. The password change hook gets called with the text of the new password set to NULL, which then gets passed into krb5_set_password, which tries to do a strlen on the NULL pointer.

For now I've set it to skip any password change operations where the password text string is NULL, but is this something the krb5 libs should have caught? Also, are there any upper bounds on the size of a password passed in? Would a hypothetical 4KB password cause issues?

Jonathan Reams
Systems Engineering
Columbia University

More information about the krbdev mailing list