Home > Security > Advisories


Mandriva Advisories

Package name xinetd
Date August 31st, 2001
Advisory ID MDKSA-2001:076
Affected versions 7.2, 8.0
Synopsis Updated xinetd packages fix many potential vulnerabilities

Problem Description

An audit has been performed on the xinetd 2.3.0 source code by Solar
Designer for many different possible vulnerabilities. The 2.3.1
release incorporated his patches into the xinetd source tree. The
audit was very thorough and found and fixed many problems. This xinetd
update includes his audit patch.

Updated Packages

Mandrakelinux 7.2

 a2173e85bed3b3173e040b242864dcc0  7.2/RPMS/xinetd-2.3.0-5.2mdk.i586.rpm
5b8663eeeefae36206b0003d61b67206  7.2/SRPMS/xinetd-2.3.0-5.2mdk.src.rpm

Mandrakelinux 8.0

 2f559b028fe14780460c37de5a521bce  8.0/RPMS/xinetd-2.3.0-5.1mdk.i586.rpm
81766c2104aa7e1f197dac9dce1c09af  8.0/RPMS/xinetd-ipv6-2.3.0-5.1mdk.i586.rpm
3f18d89cce258d2a71cc57c84068c8ce  8.0/SRPMS/xinetd-2.3.0-5.1mdk.src.rpm

Mandrakelinux 8.0/PPC

 3826a60dc427f880056622df0ef086db  ppc/8.0/RPMS/xinetd-2.3.0-5.1mdk.ppc.rpm
223c5c1566adacb46d95de1a24842c19  ppc/8.0/RPMS/xinetd-ipv6-2.3.0-5.1mdk.ppc.rpm
3e1b86780d9f59088754cbca5ff55a08  ppc/8.0/SRPMS/xinetd-2.3.0-5.1mdk.src.rpm




To upgrade automatically, use MandrivaUpdate.


Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.