Bug 130768
Summary: | xinetd sgi_fam GNOME tcpwrappers incompatibility | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Mark A White <white> |
Component: | xinetd | Assignee: | Jan Safranek <jsafrane> |
Status: | CLOSED WONTFIX | QA Contact: | Brock Organ <borgan> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | ||
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2007-10-19 19:19:42 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Mark A White
2004-08-24 15:11:31 UTC
As the upstream xinetd co-maintainer, I agree with the flags = NOLIBWRAP. This has always been the suggested way to handle rpc or tcp-wait configurations. Xinetd losing the patch is OK. This in my opinion is a bug with the sgi_fam package. Even if xinetd gets the patch back in, having the flags option corrected would help if the patch was reverted again. This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you. |