Skip to navigation

Bug Fix Advisory xinetd bug fix update

Advisory: RHBA-2011:0827-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated xinetd package that fixes several bugs is now available.

The xinetd daemon is a secure replacement for inetd, the Internet services
daemon. It provides access control for all services based on the address of
the remote host and/or on time of access, and can prevent denial of service
attacks.

This update fixes the following bugs:

* The xinetd.log man page was in the wrong man section, and has been moved
to the correct one. The command "man 5 xinetd.log" now works as expected.
(BZ#428811)

* When a log file of an xinetd-controlled service exceeded the size limit
specified in its configuration file, xinetd terminated unexpectedly with a
segmentation fault. With this update, a patch has been applied to address
this issue, and the xinetd daemon no longer crashes. (BZ#438986)

* The xinetd.init script did not set its return value correctly when
invoked with the "status" argument. This update fixes this issue by making
the xinetd.init script return values compatible with Linux Standard Base
Core Specification 3.2. (BZ#498119)

* Under certain circumstances the xinetd daemon could hang (for example,
when trying to acquire an already acquired lock for writing to its log
file) when an unexpected signal arrived. As of this update the daemon
handles unexpected signals as expected and the hangs no longer occur.
(BZ#501604)

* The xinetd daemon ignored the "port" line of the service configuration
file, so it was impossible to bind some rpc services to a specific port.
This update addresses this issue and the xinetd daemon now handles the port
number appropriately. (BZ#624800)

* This update includes a patch that fixes the compiler warning
"dereferencing type-punned pointer will break strict-aliasing rules".
(BZ#695674)

All xinetd users are advised to upgrade to this updated package, which
addresses these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xinetd-2.3.14-13.el5.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: 6644151a4697027dbac7c48bc26016c0
SHA-256: 15417771d84d2ba555cbb8c90885d72130564ba9c276bbc0559d2b39db3b6dc9
 
IA-32:
xinetd-2.3.14-13.el5.i386.rpm
File outdated by:  RHSA-2013:1409
    MD5: 272d85140cc37cf4055f70009704387f
SHA-256: 60b108b0a8cf7e942c4bb0a837773799c22c1d0b0258836f19583c2d8d044413
 
IA-64:
xinetd-2.3.14-13.el5.ia64.rpm
File outdated by:  RHSA-2013:1409
    MD5: e35a2ae0de2199b9c9fa6ab7df8d622a
SHA-256: c3eab07f49559ddd8413e902912271694948905de20e255e3f8f941b2cd6e44b
 
PPC:
xinetd-2.3.14-13.el5.ppc.rpm
File outdated by:  RHSA-2013:1409
    MD5: 058770d3d019548eadbf196830ace0c4
SHA-256: 541e1af5b7dd96472bfe40003e5350c577457d12b66be74aeaed1aca44d63f64
 
s390x:
xinetd-2.3.14-13.el5.s390x.rpm
File outdated by:  RHSA-2013:1409
    MD5: 7b0b005d2cd0f26496e45b1457be889b
SHA-256: 0c7780e1892a67a7871672b19721bd603158f3aa719a28cea34a6c5afd9ac2d1
 
x86_64:
xinetd-2.3.14-13.el5.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a8af61b5789ccc7ff3422ae48c1ac498
SHA-256: 510e5faab91b44515592f6c2efe2dacdeb9311427edb4a9d5b3da2ddf47b27b8
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xinetd-2.3.14-13.el5.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: 6644151a4697027dbac7c48bc26016c0
SHA-256: 15417771d84d2ba555cbb8c90885d72130564ba9c276bbc0559d2b39db3b6dc9
 
IA-32:
xinetd-2.3.14-13.el5.i386.rpm
File outdated by:  RHSA-2013:1409
    MD5: 272d85140cc37cf4055f70009704387f
SHA-256: 60b108b0a8cf7e942c4bb0a837773799c22c1d0b0258836f19583c2d8d044413
 
x86_64:
xinetd-2.3.14-13.el5.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a8af61b5789ccc7ff3422ae48c1ac498
SHA-256: 510e5faab91b44515592f6c2efe2dacdeb9311427edb4a9d5b3da2ddf47b27b8
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

428811 - xinetd.log man page in wrong section
438986 - RHEL4 SIGSEGV in xinetd when application's logfile hit size limit
498119 - xinetd init script 'status' does not set return value
501604 - xinetd can hang while processing unknown signal
624800 - bind rpc service to specific port
695674 - warning: dereferencing type-punned pointer will break strict-aliasing rules



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/