|Summary:||zero-length password corrupts database|
|Product:||[Retired] Red Hat Linux||Reporter:||tompermutt|
|Component:||pam||Assignee:||David Lawrence <dkl>|
|Status:||CLOSED DUPLICATE||QA Contact:|
|Fixed In Version:||Doc Type:||Bug Fix|
|Doc Text:||Story Points:||---|
|Last Closed:||1999-08-02 16:16:13 UTC||Type:||---|
|oVirt Team:||---||RHEL 7.3 requirements from Atomic Host:|
|Cloudforms Team:||---||Target Upstream Version:|
Description tompermutt 1999-07-16 00:44:49 UTC
With shadowing turned off, setting a zero-length password seems to corrupt the password data-base. Whether I do it by editing /etc/passwd, or using passwd as root, the user is unable to log on. Furthermore, even if root runs passwd again to set a non-null password, that user remains hosed.
Comment 1 Michael K. Johnson 1999-07-30 21:10:59 UTC
I cannot reproduce this. Are you using NIS or some other form of authentication besides /etc/passwd? A non-root user cannot set a null password with the passwd command; perhaps the old password is still in force for you?
Comment 2 Michael K. Johnson 1999-08-02 16:14:59 UTC
OK, 3029 does look like the same report...
Comment 3 Michael K. Johnson 1999-08-02 16:16:59 UTC
The bug really does exist. I'm not sure why I couldn't recreate it on my machine, but plenty of people have reported it. In any case, it is clearly a duplicate of 3029. Thanks for your patience... *** This bug has been marked as a duplicate of 3029 ***