Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 5906 - pam_ldap does silly things and then segfaults on password changing (repeatable)
pam_ldap does silly things and then segfaults on password changing (repeatable)
Product: Red Hat Linux
Classification: Retired
Component: pam_ldap (Show other bugs)
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Nalin Dahyabhai
Depends On:
  Show dependency treegraph
Reported: 1999-10-13 03:33 EDT by Johan Walles
Modified: 2008-05-01 11:37 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2000-02-07 10:38:09 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Johan Walles 1999-10-13 03:33:10 EDT
If I start an OpenLDAP server, add the local users and
copies /usr/doc/pam_ldap/whatever/pam.d to /etc/pam.d, and
modify /etc/ldap.conf I can then login through LDAP
authentication (I get logged in and show up in the logs).

However, when I try to change my password using either
Linuxconf or passwd, i get to tell it the new password
twice, then my old password, then the new password twice
(again) and then it segfaults.

I know there is a pam_ldap-40 version that claims to have
fixed some credentials sending errors from -36, maybe you
should check that out.

Comment 1 Nalin Dahyabhai 2000-02-07 10:38:59 EST
This should be fixed in nss_ldap-0.43-2 in Raw Hide, slated for inclusion in
our next release of Red Hat Linux.  If you have time, please verify that the
version in Raw Hide (ftp://ftp.redhat.com/pub/rawhide/i386/RedHat/RPMS/) works
properly.  I'm reasonably certain that it will no longer segfault on you, but
please reopen this bug if it continues to do so after an upgrade.

Note You need to log in before you can comment on or make changes to this bug.