Jump to letter: [
3ABCDEFGHIJKLMNOPQRSTUVWXYZ
]
xinetd - A secure replacement for inetd
- Description:
Xinetd is a secure replacement for inetd, the Internet services
daemon. Xinetd provides access control for all services based on the
address of the remote host and/or on time of access and can prevent
denial-of-access attacks. Xinetd provides extensive logging, has no
limit on the number of server arguments, and lets you bind specific
services to specific IP addresses on your host machine. Each service
has its own specific configuration file for Xinetd; the files are
located in the /etc/xinetd.d directory.
Packages
xinetd-2.3.14-40.el6.x86_64
[121 KiB] |
Changelog
by Jan Synáček (2015-12-16):
- Fix: xinetd attempts to bind to IPv6 sockets even on systems with IPv6 disabled (#1285091)
- Fix: modify the xinetd man page to make it more clear on what happens to services on xinetd reload (#1119317)
|
xinetd-2.3.14-39.el6_4.x86_64
[120 KiB] |
Changelog
by Jan Synáček (2013-09-24):
- Honor user and group directives
- Resolves: CVE-2013-4342
|
xinetd-2.3.14-38.el6.x86_64
[120 KiB] |
Changelog
by Jan Synáček (2012-12-05):
- CVE-2012-0862 xinetd: enables unintentional services over tcpmux port
- Resolves: #883653
|
xinetd-2.3.14-35.el6_3.x86_64
[119 KiB] |
Changelog
by Jan Synáček (2012-07-20):
- Fix leaking file descriptors (#841916)
|
xinetd-2.3.14-34.el6.x86_64
[119 KiB] |
Changelog
by Vojtech Vitek (V-Teq) (2012-02-13):
- Avoid possible hang while logging an unexpected signal (#694820)
- Fix Rpmdiff build warning about "dereferencing type-punned pointer" (#697783)
- Let RPC services bind to a specific port (#697788)
- Prevent memory corruption error while using large number of services (#711787)
- Fix coverity defects in poll patch (#715303)
|
xinetd-2.3.14-33.el6.x86_64
[119 KiB] |
Changelog
by Vojtech Vitek (V-Teq) (2011-09-20):
- Remove /etc/xinetd.d/ directory ownership (bz#738662)
|
xinetd-2.3.14-31.el6.x86_64
[119 KiB] |
Changelog
by Vojtech Vitek (V-Teq) (2011-02-28):
- fix crash when application's logfile hit size limit
Resolves: #678493
|