Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 13 Dec 2002 06:03:43 -0800 (PST)
From: Steve G <>
To: Solar Designer <>
Cc: "Dmitry V. Levin" <>,
Subject: Re: [Fwd: [RHSA-2002:196-09] Updated xinetd packages fix denial of service vulnerability]


>Perhaps you're aware of whether this is fixed 
>in development versions and what the fix was?

Yes there this was a problem but is now fixed. There
is one other serious problem fixed in the current
development version where descriptors were being
played with fast and loose. It the latter case, xinetd
mixed up its descriptors and sent log entries to
stdout....not good.

RedHat has rolled out 2 updates for xinetd so far and
they will be rolling out another. They are not
coordinating with anyone on the mailing list and I
think they are shooting themselves in the foot badly.
Because they are not coordinating, they are just
grabbing development snapshots that aren't complete or
fully tested.

The current development snapshot 20021209.tar.gz in
the folder is stable and will become
release 2.3.10 in the next day or two. Rob felt like
we could release 2.3.10 this week.

Here's a link to the e-mail that I posted to the group
when I discovered the cause of the leaked descriptors:

And here's a link to an e-mail where someone else
explained what he discovered about the descriptors
being mixed up:

And here's a test script he supplied:

Look for 2.3.10 to be released any day now. If you
want to be ahead of the game, look at the 1209 release
and then diff the final against it to make sure there
were no last minute surprises.

-Steve Grubb

Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the xvendor mailing list charter.