Description of problem: Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
Fix attached in Bug 481670 Please see changes there.
builder@dhcp231-124 tps]$ svn ci -m "Bugzilla BZ# 481670 and others" Sending tps/forms/esc/cgi-bin/sow/cfg.pl Sending tps/lib/perl/PKI/TPS/DRMInfoPanel.pm Sending tps/scripts/addAgents.ldif Sending tps/src/engine/RA.cpp Sending tps/src/include/engine/RA.h Sending tps/src/include/tus/tus_db.h Sending tps/src/main/ConfigStore.cpp Sending tps/src/modules/tokendb/mod_tokendb.cpp Sending tps/src/processor/RA_Enroll_Processor.cpp Sending tps/src/tus/tus_db.c Transmitting file data .......... Committed revision 211. [builder@dhcp231-124 tps]$ svn ci -m "Bugzilla BZ# 481670 and others" Sending tps/pki-tps.spec Transmitting file data . Committed revision 212.
Ade, Please provide the STR for this bug. thanks, Asha
Not sure quite how to reproduce a bug per se. You could try to create several users with more than 256 characters in the full name. At that point, the user name (if it is even allowed) will be truncated. The most important thing though is that the system should be able to function normally -- ie. check the error logs for any segmentation faults. If no segmentation faults or fatal errors occur, then no memory overrun has occurred.
Verified. Created about 40 tps users having 257 characters in the first name, error logs did not show any segmentation faults. Seeing couple of issues related to this 1) CA List Certificate UI is not shown well, it would be nice if the long string is truncated (https://bugzilla.redhat.com/show_bug.cgi?id=511939). 2) When tried to login to tps agent/admin with this user credential, SSL layer is not accepting this certificate properly (https://bugzilla.redhat.com/show_bug.cgi?id=511946) .