- Issued:
- 2013-01-07
- Updated:
- 2013-01-07
RHBA-2013:0117 - Bug Fix Advisory
Synopsis
xinetd bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xinetd packages that fix one bug are now available for Red Hat
Enterprise Linux 5.
Description
Xinetd is a secure replacement for inetd, the Internet services daemon. Xinetd
provides access control for all services based on the address of the remote host
and/or on time of access, and can prevent denial-of-access attacks. Xinetd
provides extensive logging, has no limit on the number of server arguments, and
allows users to bind specific services to specific IP addresses on a host
machine. Each service has its own specific configuration file for xinetd; the
files are located in the /etc/xinetd.d directory.
This update fixes the following bug:
- Previously, when the xinetd daemon connected to the TCPMUX service, the
service file descriptors were not closed properly. Consequently, xinetd
terminated unexpectedly with a segmentation fault. With this update, the code
has been fixed to close the file descriptors, and xinetd no longer crashes when
a connection to TCPMUX service is established. (BZ#801507)
All users of xinetd are advised to upgrade to these updated packages, which fix
this bug.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
xinetd-2.3.14-17.el5.src.rpm | SHA-256: 9e25a442bc838e116594aec8db71e785f659c92cdbb3c1eac2a9fe8f65b8b7cd |
x86_64 | |
xinetd-2.3.14-17.el5.x86_64.rpm | SHA-256: d50670b7fa9ea56f46ff931c73f580cbe0e90bb719215ad0bb6b9e713363fbd6 |
xinetd-debuginfo-2.3.14-17.el5.x86_64.rpm | SHA-256: 5f7076fe2d6f90cd0cf0eed5d5ab907fb92978de432deeafddaab22fb927051f |
ia64 | |
xinetd-2.3.14-17.el5.ia64.rpm | SHA-256: 39c5a9a21bd1aabce99c84d4a35e84712acac38b55657b2ad8641421543d7deb |
xinetd-debuginfo-2.3.14-17.el5.ia64.rpm | SHA-256: efb2a0dd5ec36bbf3bf05c3c491181a3e9b086dc6ef502ca0a59c4a4d1d0e90e |
i386 | |
xinetd-2.3.14-17.el5.i386.rpm | SHA-256: c3b7306fd326941a0ce8ff1ea991d2eccb0d985d57b65b92d551444f5ad5ec7f |
xinetd-debuginfo-2.3.14-17.el5.i386.rpm | SHA-256: 3d452384b1db6e7a6e89abb2e038231af985d1b20e5938af8a34111ffd85b7cd |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
xinetd-2.3.14-17.el5.src.rpm | SHA-256: 9e25a442bc838e116594aec8db71e785f659c92cdbb3c1eac2a9fe8f65b8b7cd |
x86_64 | |
xinetd-2.3.14-17.el5.x86_64.rpm | SHA-256: d50670b7fa9ea56f46ff931c73f580cbe0e90bb719215ad0bb6b9e713363fbd6 |
xinetd-debuginfo-2.3.14-17.el5.x86_64.rpm | SHA-256: 5f7076fe2d6f90cd0cf0eed5d5ab907fb92978de432deeafddaab22fb927051f |
i386 | |
xinetd-2.3.14-17.el5.i386.rpm | SHA-256: c3b7306fd326941a0ce8ff1ea991d2eccb0d985d57b65b92d551444f5ad5ec7f |
xinetd-debuginfo-2.3.14-17.el5.i386.rpm | SHA-256: 3d452384b1db6e7a6e89abb2e038231af985d1b20e5938af8a34111ffd85b7cd |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
xinetd-2.3.14-17.el5.src.rpm | SHA-256: 9e25a442bc838e116594aec8db71e785f659c92cdbb3c1eac2a9fe8f65b8b7cd |
x86_64 | |
xinetd-2.3.14-17.el5.x86_64.rpm | SHA-256: d50670b7fa9ea56f46ff931c73f580cbe0e90bb719215ad0bb6b9e713363fbd6 |
xinetd-debuginfo-2.3.14-17.el5.x86_64.rpm | SHA-256: 5f7076fe2d6f90cd0cf0eed5d5ab907fb92978de432deeafddaab22fb927051f |
i386 | |
xinetd-2.3.14-17.el5.i386.rpm | SHA-256: c3b7306fd326941a0ce8ff1ea991d2eccb0d985d57b65b92d551444f5ad5ec7f |
xinetd-debuginfo-2.3.14-17.el5.i386.rpm | SHA-256: 3d452384b1db6e7a6e89abb2e038231af985d1b20e5938af8a34111ffd85b7cd |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
xinetd-2.3.14-17.el5.src.rpm | SHA-256: 9e25a442bc838e116594aec8db71e785f659c92cdbb3c1eac2a9fe8f65b8b7cd |
s390x | |
xinetd-2.3.14-17.el5.s390x.rpm | SHA-256: 9e744232dadb8f3106be3cb96149041221ff12121f35a2901fbd4d2775e16198 |
xinetd-debuginfo-2.3.14-17.el5.s390x.rpm | SHA-256: ed76d2b57a6179da2378f1aa0d1063a9cd21dbc14f4295e423c58e4961159702 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
xinetd-2.3.14-17.el5.src.rpm | SHA-256: 9e25a442bc838e116594aec8db71e785f659c92cdbb3c1eac2a9fe8f65b8b7cd |
ppc | |
xinetd-2.3.14-17.el5.ppc.rpm | SHA-256: 2ae35e1b70279cde4456f7fb61d1f74c5224619fc81c0e74a086b4f52d6a5eb9 |
xinetd-debuginfo-2.3.14-17.el5.ppc.rpm | SHA-256: 4e58354b4e68efa731f140ebb920e30f8fc73ed212cb54377d7d7cf19f504f54 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
xinetd-2.3.14-17.el5.src.rpm | SHA-256: 9e25a442bc838e116594aec8db71e785f659c92cdbb3c1eac2a9fe8f65b8b7cd |
x86_64 | |
xinetd-2.3.14-17.el5.x86_64.rpm | SHA-256: d50670b7fa9ea56f46ff931c73f580cbe0e90bb719215ad0bb6b9e713363fbd6 |
xinetd-debuginfo-2.3.14-17.el5.x86_64.rpm | SHA-256: 5f7076fe2d6f90cd0cf0eed5d5ab907fb92978de432deeafddaab22fb927051f |
i386 | |
xinetd-2.3.14-17.el5.i386.rpm | SHA-256: c3b7306fd326941a0ce8ff1ea991d2eccb0d985d57b65b92d551444f5ad5ec7f |
xinetd-debuginfo-2.3.14-17.el5.i386.rpm | SHA-256: 3d452384b1db6e7a6e89abb2e038231af985d1b20e5938af8a34111ffd85b7cd |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.