Bug 172181
| Summary: | Log IPv4 adresses as IPv4, not IPv6. | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 4 | Reporter: | Anchor Systems Managed Hosting <managed> |
| Component: | openssh | Assignee: | Tomas Mraz <tmraz> |
| Status: | CLOSED DUPLICATE | QA Contact: | Brian Brock <bbrock> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 4.0 | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2005-11-01 08:07:57 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Anchor Systems Managed Hosting
2005-11-01 05:38:32 UTC
*** This bug has been marked as a duplicate of 159268 *** See the comment by Suzanne Hillman how to properly request bug fix or implementation of feature in existing RHEL release. Tomas, Read the comment at the top: "By logging ipv4 connections as ipv6 addresses, this breaks tcp_wrappers functionality and presents a significant security issue. This could hardly be seen as just an enhancemant." This is a significant security problem. TCP wrappers, one of the most basic, fundamental security measures for the system is BROKEN on RHEL 4. I've read that comment. However this doesn't change anything with the statement that bugs in RHELs should be reported to Support tracker. |