An audit has been performed on the xinetd 2.3.0 source code by Solar
Designer for many different possible vulnerabilities. The 2.3.1
release incorporated his patches into the xinetd source tree. The
audit was very thorough and found and fixed many problems. This xinetd
update includes his audit patch.
a2173e85bed3b3173e040b242864dcc0 7.2/RPMS/xinetd-2.3.0-5.2mdk.i586.rpm 5b8663eeeefae36206b0003d61b67206 7.2/SRPMS/xinetd-2.3.0-5.2mdk.src.rpm
2f559b028fe14780460c37de5a521bce 8.0/RPMS/xinetd-2.3.0-5.1mdk.i586.rpm 81766c2104aa7e1f197dac9dce1c09af 8.0/RPMS/xinetd-ipv6-2.3.0-5.1mdk.i586.rpm 3f18d89cce258d2a71cc57c84068c8ce 8.0/SRPMS/xinetd-2.3.0-5.1mdk.src.rpm
3826a60dc427f880056622df0ef086db ppc/8.0/RPMS/xinetd-2.3.0-5.1mdk.ppc.rpm 223c5c1566adacb46d95de1a24842c19 ppc/8.0/RPMS/xinetd-ipv6-2.3.0-5.1mdk.ppc.rpm 3e1b86780d9f59088754cbca5ff55a08 ppc/8.0/SRPMS/xinetd-2.3.0-5.1mdk.src.rpm
To upgrade automatically, use MandrivaUpdate.
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.