Skip to navigation

Bug Fix Advisory xinetd bug fix update

Advisory: RHBA-2012:0409-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-03-21
Last updated on: 2012-06-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated xinetd package that fixes multiple bugs is now available for Red Hat
Enterprise Linux 6.

The xinetd daemon is a secure replacement for xinetd, the Internet services
daemon. The xinetd daemon provides access control for all services based on the
address of the remote host, on time of access, or both, and can prevent denial
of service (DoS) attacks.

This update fixes the following bugs:

* Under certain circumstances, the xinetd daemon could become unresponsive (for
example, when trying to acquire an already acquired lock for writing to its log
file) when an unexpected signal arrived. With this update, the daemon handles
unexpected signals correctly and no longer hangs under these circumstances.
(BZ#694820)

* Previously, a bug in the xinetd code could cause corruption of the time_t
variable resulting in the following compiler warning:

warning: dereferencing type-punned pointer will break strict-aliasing rules

A patch has been applied to address this issue, so that the warning no longer
occurs. (BZ#697783)

* Previously, the xinetd daemon ignored the "port" line of the service
configuration file, and it was therefore impossible to bind certain RPC services
to a specific port. The underlying source code has been modified to ensure that
xinetd honors the "port" line, so that the port numbers are now handled
appropriately. (BZ#697788)

* Incorrect use of the realloc() function could cause memory corruption. This
resulted in the xinetd daemon terminating unexpectedly right after the start
when a large number of services had been configured. The realloc() function has
been removed, which ensures that memory corruption no longer occurs in this
scenario, and the xinetd daemon starts successfully even when configuring a
large number of services. (BZ#711787)

All users of xinetd are advised to upgrade to this updated package, which fixes
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
xinetd-2.3.14-34.el6.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: c9c220952f3c045074218476b70587ae
SHA-256: 6f7bf862a713273336fa61423bd02dff67fcbbefd0d8ffc45e466fff08ee4e9b
 
IA-32:
xinetd-2.3.14-34.el6.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: 2fa7f2f957431c21a9c2d5490f446cd8
SHA-256: 6dfc67f9b259555e89d17e1fcbd62a0195a1a56b67458a103dacd3e5ca09405f
xinetd-debuginfo-2.3.14-34.el6.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: 7f931af25b6ac5f5dfbb7cd825543258
SHA-256: 61e71ab7cf97ee81f3cbc043d6c10cb315acaf8604f9f9c6c6fce5e699cc2468
 
x86_64:
xinetd-2.3.14-34.el6.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a57352dfc092bfe2552397142aa39bb8
SHA-256: 354dce6e6505d1506971451683492b0b8abe68501aa3c4c5d1f5f96368573616
xinetd-debuginfo-2.3.14-34.el6.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: cb09b0477b37dae9a1d710dc7f06e792
SHA-256: 506cd425fe0b66334f6eff2c6c8c298dfe2475d1fca92bd4401670fb86edd7d1
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
xinetd-2.3.14-34.el6.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: c9c220952f3c045074218476b70587ae
SHA-256: 6f7bf862a713273336fa61423bd02dff67fcbbefd0d8ffc45e466fff08ee4e9b
 
x86_64:
xinetd-2.3.14-34.el6.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a57352dfc092bfe2552397142aa39bb8
SHA-256: 354dce6e6505d1506971451683492b0b8abe68501aa3c4c5d1f5f96368573616
xinetd-debuginfo-2.3.14-34.el6.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: cb09b0477b37dae9a1d710dc7f06e792
SHA-256: 506cd425fe0b66334f6eff2c6c8c298dfe2475d1fca92bd4401670fb86edd7d1
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
xinetd-2.3.14-34.el6.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: c9c220952f3c045074218476b70587ae
SHA-256: 6f7bf862a713273336fa61423bd02dff67fcbbefd0d8ffc45e466fff08ee4e9b
 
IA-32:
xinetd-2.3.14-34.el6.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: 2fa7f2f957431c21a9c2d5490f446cd8
SHA-256: 6dfc67f9b259555e89d17e1fcbd62a0195a1a56b67458a103dacd3e5ca09405f
xinetd-debuginfo-2.3.14-34.el6.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: 7f931af25b6ac5f5dfbb7cd825543258
SHA-256: 61e71ab7cf97ee81f3cbc043d6c10cb315acaf8604f9f9c6c6fce5e699cc2468
 
PPC:
xinetd-2.3.14-34.el6.ppc64.rpm
File outdated by:  RHSA-2013:1409
    MD5: ac5783891819480c3e79b2ee316e13b6
SHA-256: 9bbf49fde0909a6696dfbe5d67618682437485f0515d173a48c81f611b6a8f5a
xinetd-debuginfo-2.3.14-34.el6.ppc64.rpm
File outdated by:  RHSA-2013:1409
    MD5: 1d7aab62a763183e75a0fea1b39545dd
SHA-256: ad459501dfe0e2882876b3ef9344862953db40281f67c46e91a5c6a5862b187d
 
s390x:
xinetd-2.3.14-34.el6.s390x.rpm
File outdated by:  RHSA-2013:1409
    MD5: 2ae584eb53714745964ad29af8951468
SHA-256: 0f7ea27a4124e0521c62721ee1cf81cdfe639908caab3a902218cd448a8134ee
xinetd-debuginfo-2.3.14-34.el6.s390x.rpm
File outdated by:  RHSA-2013:1409
    MD5: cca3600939ecefbc25eb2f91bf0e7155
SHA-256: 7383adfed4c6f9c58d9b18ce882e8254758b2e7debf9bdc9b52ec4a2ba9ab5fc
 
x86_64:
xinetd-2.3.14-34.el6.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a57352dfc092bfe2552397142aa39bb8
SHA-256: 354dce6e6505d1506971451683492b0b8abe68501aa3c4c5d1f5f96368573616
xinetd-debuginfo-2.3.14-34.el6.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: cb09b0477b37dae9a1d710dc7f06e792
SHA-256: 506cd425fe0b66334f6eff2c6c8c298dfe2475d1fca92bd4401670fb86edd7d1
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
xinetd-2.3.14-34.el6.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: c9c220952f3c045074218476b70587ae
SHA-256: 6f7bf862a713273336fa61423bd02dff67fcbbefd0d8ffc45e466fff08ee4e9b
 
IA-32:
xinetd-2.3.14-34.el6.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: 2fa7f2f957431c21a9c2d5490f446cd8
SHA-256: 6dfc67f9b259555e89d17e1fcbd62a0195a1a56b67458a103dacd3e5ca09405f
xinetd-debuginfo-2.3.14-34.el6.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: 7f931af25b6ac5f5dfbb7cd825543258
SHA-256: 61e71ab7cf97ee81f3cbc043d6c10cb315acaf8604f9f9c6c6fce5e699cc2468
 
x86_64:
xinetd-2.3.14-34.el6.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a57352dfc092bfe2552397142aa39bb8
SHA-256: 354dce6e6505d1506971451683492b0b8abe68501aa3c4c5d1f5f96368573616
xinetd-debuginfo-2.3.14-34.el6.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: cb09b0477b37dae9a1d710dc7f06e792
SHA-256: 506cd425fe0b66334f6eff2c6c8c298dfe2475d1fca92bd4401670fb86edd7d1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

694820 - xinetd can hang while processing unknown signal
697783 - warning: dereferencing type-punned pointer will break strict-aliasing rules
697788 - bind rpc service to specific port
715303 - Defects revealed by coverity scan



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/