Created attachment 796765 [details] Patch Description of problem: Invalid parsing pam_pwquality parameters, that cause ignoring password restrictions How reproducible: pam config: ... password required pam_pwquality.so try_first_pass retry=3 minclass=4 enforce_for_root authtok_type= retry=1 ... Steps to Reproduce: 1. configure pam with pam_pwquality module with a lot of parameters 2. try to change password Actual results: in system log: сен 12 12:41:06 localhost.confi.ru python[5616]: pam_pwquality(tlogin:chauthtok): pam_parse: unknown or broken option; minclass=4 сен 12 12:41:06 localhost.confi.ru python[5616]: pam_pwhistory(tlogin:chauthtok): pam_sm_chauthtok entered сен 12 12:41:06 localhost.confi.ru python[5616]: pam_pwhistory(tlogin:chauthtok): pam_sm_chauthtok(PAM_PRELIM_CHECK) сен 12 12:41:06 localhost.confi.ru python[5616]: pam_pwquality(tlogin:chauthtok): pam_parse: unknown or broken option; minclass=4 Expected results: empty system log Additional info:
Thanks for report I wonder why such dire bug was not noticed earlier.
libpwquality-1.2.3-1.fc19 has been submitted as an update for Fedora 19. https://admin.fedoraproject.org/updates/libpwquality-1.2.3-1.fc19
Package libpwquality-1.2.3-1.fc19: * should fix your issue, * was pushed to the Fedora 19 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing libpwquality-1.2.3-1.fc19' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2013-16884/libpwquality-1.2.3-1.fc19 then log in and leave karma (feedback).
libpwquality-1.2.3-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.