Skip to navigation

Bug Fix Advisory xinetd bug fix update

Advisory: RHBA-2012:1162-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-08-13
Last updated on: 2012-08-13
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated xinetd package that fixes one bug is now available for Red Hat
Enterprise Linux 6.

Xinetd is a secure replacement for inetd, the Internet services daemon. Xinetd
provides access control for all services based on the address of the remote host
and/or on time of access, and can prevent denial-of-access attacks. Xinetd
provides extensive logging, has no limit on the number of server arguments, and
allows users to bind specific services to specific IP addresses on a host
machine. Each service has its own specific configuration file for Xinetd; the
files are located in the /etc/xinetd.d directory.

This update fixes the following bug:

* Due to incorrect handling of a file descriptor array in the service.c source
file, some of the descriptors remained open when xinetd was under heavy load.
Additionally, the system log was filled with a large number of messages that
took up a lot of disk space over time. This bug has been fixed in the code,
xinetd now handles the file descriptors correctly and no longer fills the system
log. (BZ#841916)

All users of xinetd are advised to upgrade to this updated package, which fixes
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
xinetd-2.3.14-35.el6_3.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: 94474c3a14764ddee46cd1846094ed4c
SHA-256: aa6db1232e92be13d8d6354a06b3d6b02592951658f9aec6441e60e40c233c5f
 
IA-32:
xinetd-2.3.14-35.el6_3.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: 417c4c05c19ac18900c4cd5f3a06ea33
SHA-256: ee87daf9794ee9e767b87a7ac07ad8dd929934f23c971e100b8d791ecad42f19
xinetd-debuginfo-2.3.14-35.el6_3.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: c0b12b9060ccd82bfa0f3a8d25a88780
SHA-256: 141c150aa85aa2765f5c5471993e933875ae508c0c8de9641b46b2409e215aac
 
x86_64:
xinetd-2.3.14-35.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: fd44b62fba5b18e5497ecb8ba782b2e7
SHA-256: b4c54c50fd18e56aec34ece36f1ab6eed87746a917b5e286879727fe5f94797d
xinetd-debuginfo-2.3.14-35.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a2495e86b52a77ca86b465eafdd6a079
SHA-256: d12266615d43aee4b1bc23d0053407374fc0de05f0370aba796d3fe171880a64
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
xinetd-2.3.14-35.el6_3.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: 94474c3a14764ddee46cd1846094ed4c
SHA-256: aa6db1232e92be13d8d6354a06b3d6b02592951658f9aec6441e60e40c233c5f
 
x86_64:
xinetd-2.3.14-35.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: fd44b62fba5b18e5497ecb8ba782b2e7
SHA-256: b4c54c50fd18e56aec34ece36f1ab6eed87746a917b5e286879727fe5f94797d
xinetd-debuginfo-2.3.14-35.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a2495e86b52a77ca86b465eafdd6a079
SHA-256: d12266615d43aee4b1bc23d0053407374fc0de05f0370aba796d3fe171880a64
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
xinetd-2.3.14-35.el6_3.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: 94474c3a14764ddee46cd1846094ed4c
SHA-256: aa6db1232e92be13d8d6354a06b3d6b02592951658f9aec6441e60e40c233c5f
 
IA-32:
xinetd-2.3.14-35.el6_3.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: 417c4c05c19ac18900c4cd5f3a06ea33
SHA-256: ee87daf9794ee9e767b87a7ac07ad8dd929934f23c971e100b8d791ecad42f19
xinetd-debuginfo-2.3.14-35.el6_3.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: c0b12b9060ccd82bfa0f3a8d25a88780
SHA-256: 141c150aa85aa2765f5c5471993e933875ae508c0c8de9641b46b2409e215aac
 
PPC:
xinetd-2.3.14-35.el6_3.ppc64.rpm
File outdated by:  RHSA-2013:1409
    MD5: d20e5cb43dcbc8bc21e438f18340152b
SHA-256: 8718084d9b202e73f618b158aac0d36d23b0636fc80cc26725eada90d9d47845
xinetd-debuginfo-2.3.14-35.el6_3.ppc64.rpm
File outdated by:  RHSA-2013:1409
    MD5: 03e23200f9b8d78005fa8b070bdd450a
SHA-256: ed238581103f967c59d3c61b18c52cedc3b455bd66b9cc582241c342aae7e580
 
s390x:
xinetd-2.3.14-35.el6_3.s390x.rpm
File outdated by:  RHSA-2013:1409
    MD5: 67eb6ce23b0ca8868792f8c39b98b6ab
SHA-256: 1cafd40b9bab7d63d9f5583192778cd24b04a387b42c8f2f8243399703f5a189
xinetd-debuginfo-2.3.14-35.el6_3.s390x.rpm
File outdated by:  RHSA-2013:1409
    MD5: 3baa014d7ffb538a89abbc4fe33faa2c
SHA-256: 0a8b3d549757dafff39d8ecb6cd8c06dc3f9a070029e798a128bf83e27eb569b
 
x86_64:
xinetd-2.3.14-35.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: fd44b62fba5b18e5497ecb8ba782b2e7
SHA-256: b4c54c50fd18e56aec34ece36f1ab6eed87746a917b5e286879727fe5f94797d
xinetd-debuginfo-2.3.14-35.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a2495e86b52a77ca86b465eafdd6a079
SHA-256: d12266615d43aee4b1bc23d0053407374fc0de05f0370aba796d3fe171880a64
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
xinetd-2.3.14-35.el6_3.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: 94474c3a14764ddee46cd1846094ed4c
SHA-256: aa6db1232e92be13d8d6354a06b3d6b02592951658f9aec6441e60e40c233c5f
 
IA-32:
xinetd-2.3.14-35.el6_3.i686.rpm     MD5: 417c4c05c19ac18900c4cd5f3a06ea33
SHA-256: ee87daf9794ee9e767b87a7ac07ad8dd929934f23c971e100b8d791ecad42f19
xinetd-debuginfo-2.3.14-35.el6_3.i686.rpm     MD5: c0b12b9060ccd82bfa0f3a8d25a88780
SHA-256: 141c150aa85aa2765f5c5471993e933875ae508c0c8de9641b46b2409e215aac
 
PPC:
xinetd-2.3.14-35.el6_3.ppc64.rpm     MD5: d20e5cb43dcbc8bc21e438f18340152b
SHA-256: 8718084d9b202e73f618b158aac0d36d23b0636fc80cc26725eada90d9d47845
xinetd-debuginfo-2.3.14-35.el6_3.ppc64.rpm     MD5: 03e23200f9b8d78005fa8b070bdd450a
SHA-256: ed238581103f967c59d3c61b18c52cedc3b455bd66b9cc582241c342aae7e580
 
s390x:
xinetd-2.3.14-35.el6_3.s390x.rpm     MD5: 67eb6ce23b0ca8868792f8c39b98b6ab
SHA-256: 1cafd40b9bab7d63d9f5583192778cd24b04a387b42c8f2f8243399703f5a189
xinetd-debuginfo-2.3.14-35.el6_3.s390x.rpm     MD5: 3baa014d7ffb538a89abbc4fe33faa2c
SHA-256: 0a8b3d549757dafff39d8ecb6cd8c06dc3f9a070029e798a128bf83e27eb569b
 
x86_64:
xinetd-2.3.14-35.el6_3.x86_64.rpm     MD5: fd44b62fba5b18e5497ecb8ba782b2e7
SHA-256: b4c54c50fd18e56aec34ece36f1ab6eed87746a917b5e286879727fe5f94797d
xinetd-debuginfo-2.3.14-35.el6_3.x86_64.rpm     MD5: a2495e86b52a77ca86b465eafdd6a079
SHA-256: d12266615d43aee4b1bc23d0053407374fc0de05f0370aba796d3fe171880a64
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
xinetd-2.3.14-35.el6_3.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: 94474c3a14764ddee46cd1846094ed4c
SHA-256: aa6db1232e92be13d8d6354a06b3d6b02592951658f9aec6441e60e40c233c5f
 
IA-32:
xinetd-2.3.14-35.el6_3.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: 417c4c05c19ac18900c4cd5f3a06ea33
SHA-256: ee87daf9794ee9e767b87a7ac07ad8dd929934f23c971e100b8d791ecad42f19
xinetd-debuginfo-2.3.14-35.el6_3.i686.rpm
File outdated by:  RHSA-2013:1409
    MD5: c0b12b9060ccd82bfa0f3a8d25a88780
SHA-256: 141c150aa85aa2765f5c5471993e933875ae508c0c8de9641b46b2409e215aac
 
x86_64:
xinetd-2.3.14-35.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: fd44b62fba5b18e5497ecb8ba782b2e7
SHA-256: b4c54c50fd18e56aec34ece36f1ab6eed87746a917b5e286879727fe5f94797d
xinetd-debuginfo-2.3.14-35.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: a2495e86b52a77ca86b465eafdd6a079
SHA-256: d12266615d43aee4b1bc23d0053407374fc0de05f0370aba796d3fe171880a64
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

841916 - xinetd leaking file descriptors


Keywords

leak, xinetd


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/