Bug 30635
Summary: | rusers-server has remote root exploit, installed by default | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Mat Butler <elrickmc> |
Component: | rusers | Assignee: | Phil Knirsch <pknirsch> |
Status: | CLOSED WONTFIX | QA Contact: | David Lawrence <dkl> |
Severity: | medium | Docs Contact: | |
Priority: | high | ||
Version: | 6.2 | CC: | dr, jarno.huuskonen, rvokal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2002-01-17 11:35:36 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Mat Butler
2001-03-05 08:00:31 UTC
Could you send me the information via email to phil? Thanks, Read ya, Phil As no information has been sent to me i'll close this bug now. Read ya, Phil |