I have this chased down to the following line: Line 256 in support.c
retval = krb5_get_init_creds_password(ctx->context, &creds, ctx->princ, pass, pamk5_prompter_krb5, ctx->pamh, 0, in_tkt_service, &opts); I believe the krb5_get_init_creds_password call is returning some invalid code ( -1765328360 doesnt sound like a realistic retval considering the other values ) This then gets passed to krb5_compat_get_err_text at logging.c [81] which ultimately passes it off to heimdal codes (where I lose the plot on tracking it) compat_heimdal.c[26] 23 const char * 24 pamk5_compat_get_err_text(krb5_context c, krb5_error_code code) 25 { 26 return krb5_get_err_text(c, code); 27 } Which produces the segfault (presumably because it doesnt like the value passed). Now to go find someone who knows the heimdal stuff enough to point me in the right direction there... In the meantime, I've cheated and masked the problem by swapping retval for what appears to be a valid error code. Thats a cheap hack, but I need it to not segfault right now :P -- general protection fault in libpam-heimdal/sshd https://bugs.launchpad.net/bugs/235170 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs