Bug 1995483

Summary: tcp_wrapper related daemons eat 100% CPU when a line of hosts.allow is exceeds 2048byte
Product: Red Hat Enterprise Linux 7 Reporter: Flos Qi Guo <qguo>
Component: tcp_wrappersAssignee: Jakub Jelen <jjelen>
Status: CLOSED WONTFIX QA Contact: qe-baseos-daemons
Severity: high Docs Contact:
Priority: high    
Version: 7.9CC: antihong, jlieskov, plautrba, qe-baseos-daemons, rmcswain
Target Milestone: rcKeywords: Patch
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: 727445 Environment:
Last Closed: 2021-08-24 09:16:28 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 727445    
Bug Blocks: 731350, 1002709    

Comment 4 Jakub Jelen 2021-08-24 09:16:28 UTC
RHEL 7 is in maintanance phase 2, which means

> Red Hat defined Critical and Important impact Security Advisories (RHSAs) and selected (at Red Hat discretion) Urgent Priority Bug Fix Advisories (RHBAs) 

https://access.redhat.com/support/policy/updates/errata#Maintenance_Support_2_Phase

This does not fall into either of these (if it would, it would be already fixed), moreover the tcp_wrappers are deprecated in RHEL7 and not available in any further releases.

Instead of spending more of our time on fixing tcp_wrappers, your time debugging tcp_wrappers and customer's time to setting up rules in tcp_wrappers, I would suggest to move the rules into firewall or iptables, as they can use them also in RHEL8 and newer.