[22459] in bugtraq

home help back first fref pref prev next nref lref last post

ImmunixOS 7.0 update for xinetd

daemon@ATHENA.MIT.EDU (Immunix Security Team)
Wed Aug 29 21:53:36 2001

Date: Wed, 29 Aug 2001 18:31:09 -0700
From: Immunix Security Team <security@wirex.com>
To: security-alerts@linuxsecurity.com, bugtraq@securityfocus.com,
        linux-security-announce@seifried.org, immunix-announce@immunix.org
Message-ID: <20010829183109.B11991@wirex.com>
Mail-Followup-To: security-alerts@linuxsecurity.com,
	bugtraq@securityfocus.com, linux-security-announce@seifried.org,
	immunix-announce@immunix.org
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="SLDf9lqlvOQaIe6s"
Content-Disposition: inline

--SLDf9lqlvOQaIe6s
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

-----------------------------------------------------------------------
	Immunix OS Security Advisory

Packages updated:	xinetd
Affected products:	Immunix OS 7.0
Bugs fixed:		immunix/1698
Date:			Wed Aug 29 2001
Advisory ID:		IMNX-2001-70-033-01
Author:			Seth Arnold <sarnold@wirex.com>
-----------------------------------------------------------------------

Description:
  Solar Designer has audited the xinetd 2.3.0 source code for many
  different possible vulnerabilities; the 2.3.1 release represents his
  patches being merged into the standard xinetd source. His audit
  was fairly thorough and found too many problems to report them
  all here. 2.3.2 fixes a heap overrun, with the fix due to Trond
  Eivind Glomsr=F8d. Steve Grubb contributed many other fixes, though
  none appear to be directly security-related.

  Suffice it to say that it is only a matter of time before the
  problems fixed here are turned into exploits; we recommend all
  users running xinetd upgrade soon.


Package names and locations:
  Precompiled binary packages for Immunix 7.0 are available at:
  http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/xinetd-2.3.3-1_imn=
x.i386.rpm

  Source package for Immunix 7.0 is available at:
  http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/xinetd-2.3.3-1_im=
nx.src.rpm

Immunix OS 7.0 md5sums:
  654c1aa4337fbb5752e80d173b186266  RPMS/xinetd-2.3.3-1_imnx.i386.rpm
  2e992bf61ab5439f18e3740a502dc050  SRPMS/xinetd-2.3.3-1_imnx.src.rpm


GPG verification:                                                          =
    =20
  Our public key is available at <http://wirex.com/security/GPG_KEY>.      =
    =20
  *** NOTE *** This key is different from the one used in advisories       =
    =20
  IMNX-2001-70-020-01 and earlier.

Online version of all Immunix 6.2 updates and advisories:
  http://immunix.org/ImmunixOS/6.2/updates/

Online version of all Immunix 7.0-beta updates and advisories:
  http://immunix.org/ImmunixOS/7.0-beta/updates/

Online version of all Immunix 7.0 updates and advisories:
  http://immunix.org/ImmunixOS/7.0/updates/

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact security@wirex.com. WireX=20
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.

--SLDf9lqlvOQaIe6s
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjuNl1wACgkQVQcWL60UVMvw8QCdEmxIuuNF4pKEBEpWmZ22Ohva
TGIAoJEXclVyXBcGFeA1NbahXg1H5UH5
=yA3Q
-----END PGP SIGNATURE-----

--SLDf9lqlvOQaIe6s--

home help back first fref pref prev next nref lref last post