Bug 741552 - Password change fails
Summary: Password change fails
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: cracklib
Version: 6.1
Hardware: x86_64
OS: Unspecified
unspecified
high
Target Milestone: rc
: ---
Assignee: Nalin Dahyabhai
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-09-27 09:18 UTC by Diego Fernández Durán
Modified: 2012-12-17 15:40 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-12-17 15:40:16 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Diego Fernández Durán 2011-09-27 09:18:48 UTC
Description of problem:
passwd fails with error.
/usr/share/cracklib/pw_dict: error reading header

Version-Release number of selected component (if applicable):
Name        : passwd
Arch        : x86_64
Version     : 0.77
Release     : 4.el6

How reproducible:
Just change a user password with passwd or system-config-users

Steps to Reproduce:
1. $ passwd
2. Write password the first time.
3. Error!
  
Actual results:
Password not set and message:

/usr/share/cracklib/pw_dict: error reading header

Expected results:
Password change.

Additional info:
The problem seems to be cracklib-dict.
The workaround found is reinstalling cracklib-dicts.

# rpm -e cracklib-dicts --nodeps
# yum install cracklib-dicts

Comment 2 RHEL Program Management 2011-09-27 09:38:46 UTC
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated
in the current release, Red Hat is unfortunately unable to
address this request at this time. Red Hat invites you to
ask your support representative to propose this request, if
appropriate and relevant, in the next release of Red Hat
Enterprise Linux. If you would like it considered as an
exception in the current release, please ask your support
representative.

Comment 3 Nalin Dahyabhai 2011-09-27 16:42:06 UTC
I'm reasonably sure that this isn't a 32/64-bit problem, as we fixed that bug some time ago, and a spot-check shows that my 64-bit libraries don't have an issue with the files from the 32-bit version of the cracklib-dicts package.

If you can still reproduce this error, can you paste the output of these commands?

  rpm -qa --qf '%{n}-%{v}-%{r}.%{arch}\n' 'cracklib*'
  rpm -Va 'cracklib*'
  fixfiles -R passwd,pam,cracklib,cracklib-dicts check

The first will list all of the cracklib-related packages you have installed, the second will verify that their contents haven't been unexpectedly modified (and should produce no output, indicating that everything's fine), and the third will check for labeling errors on files provided by the four packages listed (its output will also be empty if there are no errors).  None of them will modify your system.

Comment 4 Nalin Dahyabhai 2011-11-29 21:31:55 UTC
Any information?

Comment 5 RHEL Program Management 2012-09-07 05:31:44 UTC
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated
in the current release, Red Hat is unable to address this
request at this time.

Red Hat invites you to ask your support representative to
propose this request, if appropriate, in the next release of
Red Hat Enterprise Linux.

Comment 6 Nalin Dahyabhai 2012-12-14 21:50:34 UTC
Any information?  If not, I'm going to have to mark this as closed due to insufficient data.

Comment 7 Diego Fernández Durán 2012-12-17 08:43:03 UTC
I don't admin new systems running 6.1 anymore, so I can't test if this bug is still happening in new installed machines.

Comment 8 Nalin Dahyabhai 2012-12-17 15:40:16 UTC
Alright then.  I'm sorry we couldn't figure out what was going on here.  Marking as closed with reason insufficient-data.  If you ever run across this again, please reopen the bug.  Thanks!


Note You need to log in before you can comment on or make changes to this bug.