Bug 1271
Summary: | security issue mentioned in comp.risks 20.22 | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | kevin lyda <kevin> |
Component: | finger | Assignee: | Crutcher Dunnavant <crutcher> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 5.2 | Keywords: | Security |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 1999-04-08 15:49:50 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
kevin lyda
1999-02-21 22:21:47 UTC
sorry, i didn't update the documentation. this bug has been mentioned in lwn.net by the way, so hopefully you can use this to get security brownie points. :) the new files live on incoming.redhat.com, and they're called finger-0.10-7.src.rpm and finger-0.10-7.i386.rpm. it has the updated man page, as well as a small tweak of the usage blurb. also, dholland is no longer the maintainer. i've asked him who is, and i'll pass the info back if you'd like. Patch applied in finger-0.10-23. Thanks. |