Bug 4060

Summary: zero-length password corrupts database
Product: [Retired] Red Hat Linux Reporter: tompermutt
Component: pamAssignee: David Lawrence <dkl>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 6.0   
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 1999-08-02 16:16:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description tompermutt 1999-07-16 00:44:49 UTC
With shadowing turned off, setting a zero-length password
seems to corrupt the password data-base.  Whether I do it by
editing /etc/passwd, or using passwd as root, the user is
unable to log on.  Furthermore, even if root runs passwd
again to set a non-null password, that user remains hosed.

Comment 1 Michael K. Johnson 1999-07-30 21:10:59 UTC
I cannot reproduce this.  Are you using NIS or some other form of
authentication besides /etc/passwd?  A non-root user cannot set a
null password with the passwd command; perhaps the old password is
still in force for you?

Comment 2 Michael K. Johnson 1999-08-02 16:14:59 UTC
OK, 3029 does look like the same report...

Comment 3 Michael K. Johnson 1999-08-02 16:16:59 UTC
The bug really does exist.  I'm not sure why I couldn't recreate it
on my machine, but plenty of people have reported it.  In any case,
it is clearly a duplicate of 3029.  Thanks for your patience...

*** This bug has been marked as a duplicate of 3029 ***