Summary: | xinetd bombs-out and confuses which server handles connections after cps rate-restriction | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Tim Haynes (RETIRED) <piglet> |
Component: | Current packages | Assignee: | Joachim Blaabjerg (RETIRED) <styx> |
Status: | VERIFIED INVALID | ||
Severity: | normal | CC: | h3y, mholzer |
Priority: | High | ||
Version: | 1.4_rc2 | ||
Hardware: | x86 | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Tim Haynes (RETIRED)
2003-01-10 17:24:49 UTC
who wants to repair/maintain xinetd? is this fixed in 2.3.12 ? normal xinetd function configure your system This was not an invalid bug. xinetd passing connections to the wrong process for the job was a serious fault with potential security ramifications. Fortunately, more recent builds of xinetd (tested subsequent to the mem-leak vulnerability) do not exhibit the problem, therefore I'm prepared to consider it closed for the time being. |