Skip to navigation

Bug Fix Advisory xinetd bug fix update

Advisory: RHBA-2013:0117-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated xinetd packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

Xinetd is a secure replacement for inetd, the Internet services daemon. Xinetd
provides access control for all services based on the address of the remote host
and/or on time of access, and can prevent denial-of-access attacks. Xinetd
provides extensive logging, has no limit on the number of server arguments, and
allows users to bind specific services to specific IP addresses on a host
machine. Each service has its own specific configuration file for xinetd; the
files are located in the /etc/xinetd.d directory.

This update fixes the following bug:

* Previously, when the xinetd daemon connected to the TCPMUX service, the
service file descriptors were not closed properly. Consequently, xinetd
terminated unexpectedly with a segmentation fault. With this update, the code
has been fixed to close the file descriptors, and xinetd no longer crashes when
a connection to TCPMUX service is established. (BZ#801507)

All users of xinetd are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xinetd-2.3.14-17.el5.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: a4f581da50f8d4d3163161820b2849a5
SHA-256: 9e25a442bc838e116594aec8db71e785f659c92cdbb3c1eac2a9fe8f65b8b7cd
 
IA-32:
xinetd-2.3.14-17.el5.i386.rpm
File outdated by:  RHSA-2013:1409
    MD5: cbf928af7c2113975aac98159005120d
SHA-256: c3b7306fd326941a0ce8ff1ea991d2eccb0d985d57b65b92d551444f5ad5ec7f
xinetd-debuginfo-2.3.14-17.el5.i386.rpm
File outdated by:  RHSA-2013:1409
    MD5: 721dda564e32a0083cb626f02850d5e8
SHA-256: 3d452384b1db6e7a6e89abb2e038231af985d1b20e5938af8a34111ffd85b7cd
 
IA-64:
xinetd-2.3.14-17.el5.ia64.rpm
File outdated by:  RHSA-2013:1409
    MD5: e4b9f2563cac711a4f8eae44f01cd437
SHA-256: 39c5a9a21bd1aabce99c84d4a35e84712acac38b55657b2ad8641421543d7deb
xinetd-debuginfo-2.3.14-17.el5.ia64.rpm
File outdated by:  RHSA-2013:1409
    MD5: eeddf4972ec21d89f93431222d33322a
SHA-256: efb2a0dd5ec36bbf3bf05c3c491181a3e9b086dc6ef502ca0a59c4a4d1d0e90e
 
PPC:
xinetd-2.3.14-17.el5.ppc.rpm
File outdated by:  RHSA-2013:1409
    MD5: bfdc7b9b4cb7b2447698b5b59a86992b
SHA-256: 2ae35e1b70279cde4456f7fb61d1f74c5224619fc81c0e74a086b4f52d6a5eb9
xinetd-debuginfo-2.3.14-17.el5.ppc.rpm
File outdated by:  RHSA-2013:1409
    MD5: 2905053b1bb0b3ae555b6ef8f850d8b4
SHA-256: 4e58354b4e68efa731f140ebb920e30f8fc73ed212cb54377d7d7cf19f504f54
 
s390x:
xinetd-2.3.14-17.el5.s390x.rpm
File outdated by:  RHSA-2013:1409
    MD5: a346c95b582ce05e5b6987ec9cb93beb
SHA-256: 9e744232dadb8f3106be3cb96149041221ff12121f35a2901fbd4d2775e16198
xinetd-debuginfo-2.3.14-17.el5.s390x.rpm
File outdated by:  RHSA-2013:1409
    MD5: 6b841ec5ae88e632b9773d28100a1fc4
SHA-256: ed76d2b57a6179da2378f1aa0d1063a9cd21dbc14f4295e423c58e4961159702
 
x86_64:
xinetd-2.3.14-17.el5.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: 4e0629d1d94834b0451e84faff4a601e
SHA-256: d50670b7fa9ea56f46ff931c73f580cbe0e90bb719215ad0bb6b9e713363fbd6
xinetd-debuginfo-2.3.14-17.el5.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: 40dd30cceb071386327c6ccd0cdca622
SHA-256: 5f7076fe2d6f90cd0cf0eed5d5ab907fb92978de432deeafddaab22fb927051f
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xinetd-2.3.14-17.el5.src.rpm
File outdated by:  RHSA-2013:1409
    MD5: a4f581da50f8d4d3163161820b2849a5
SHA-256: 9e25a442bc838e116594aec8db71e785f659c92cdbb3c1eac2a9fe8f65b8b7cd
 
IA-32:
xinetd-2.3.14-17.el5.i386.rpm
File outdated by:  RHSA-2013:1409
    MD5: cbf928af7c2113975aac98159005120d
SHA-256: c3b7306fd326941a0ce8ff1ea991d2eccb0d985d57b65b92d551444f5ad5ec7f
xinetd-debuginfo-2.3.14-17.el5.i386.rpm
File outdated by:  RHSA-2013:1409
    MD5: 721dda564e32a0083cb626f02850d5e8
SHA-256: 3d452384b1db6e7a6e89abb2e038231af985d1b20e5938af8a34111ffd85b7cd
 
x86_64:
xinetd-2.3.14-17.el5.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: 4e0629d1d94834b0451e84faff4a601e
SHA-256: d50670b7fa9ea56f46ff931c73f580cbe0e90bb719215ad0bb6b9e713363fbd6
xinetd-debuginfo-2.3.14-17.el5.x86_64.rpm
File outdated by:  RHSA-2013:1409
    MD5: 40dd30cceb071386327c6ccd0cdca622
SHA-256: 5f7076fe2d6f90cd0cf0eed5d5ab907fb92978de432deeafddaab22fb927051f
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

xinetd


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/