Bug 1773506

Summary: Truncated shadowPasswords in nslcd 0.8.13
Product: Red Hat Enterprise Linux 7 Reporter: Chetan Patil <cpatil>
Component: nss-pam-ldapdAssignee: Tomas Halman <thalman>
Status: CLOSED ERRATA QA Contact: Filip Dvorak <fdvorak>
Severity: high Docs Contact:
Priority: high    
Version: 7.6CC: abondare, afarley, jhrozek, mzeleny, stuart.haycroft-nonboeing, thalman, tscherf
Target Milestone: rcKeywords: ZStream
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: sync-to-jira
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: 1425790
: 1819648 (view as bug list) Environment:
Last Closed: 2020-09-29 20:12:55 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1425790    
Bug Blocks: 1420851, 1819648    

Comment 3 Stuart 2020-01-31 08:42:28 UTC
This was identified as a bug in the upstream project

https://github.com/arthurdejong/nss-pam-ldapd/commit/5dea48ddf0a9b9f422ecb9dc7ba795cea4c6d11a

This just needs incorporating.

Comment 4 Stuart 2020-01-31 08:44:04 UTC
This bug indicates that the issue is a clone of 1425790.  

This is not the case, 1425790 was an issue of password length itself. 

This bug is to do with the buffer that holds the encrypted shadowPassword value.

Comment 15 errata-xmlrpc 2020-09-29 20:12:55 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (nss-pam-ldapd bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:3969