Home > Security > Advisories


Mandriva Advisories

Package name xinetd
Date July 5th, 2001
Advisory ID MDKSA-2001:055-1
Affected versions 7.2, 8.0
Synopsis Updated xinetd packages fix improper umask and buffer overflows

Problem Description

A bug exists in xinetd as shipped with Mandrake Linux 8.0 dealing with
TCP connections with the WAIT state that prevents linuxconf-web from
working properly. As well, xinetd contains a security flaw in which
it defaults to a umask of 0. This means that applications using the
xinetd umask that do not set permissions themselves (like SWAT, a web
configuration tool for Samba), will create world writable files. This
update sets the default umask to 022.


This update forces the TMPDIR to /tmp instead of obtaining it from the
root user by default, which uses /root/tmp. As well, this version of
xinetd also fixed a possible buffer overflow in the logging code that
was reported by zen-parse on bugtraq, but was not mentioned in the
previous advisory.

Updated Packages

Mandrakelinux 7.2

 681f8a35afdaea2781d4fc32d93993ab  7.2/RPMS/xinetd-2.3.0-1.2mdk.i586.rpm
1b3650c4d3bf4f110a795639fbf4000b  7.2/SRPMS/xinetd-2.3.0-1.2mdk.src.rpm

Mandrakelinux 8.0

 d9e1bdc5a29712a75608c4753f6d6490  8.0/RPMS/xinetd-2.3.0-1.1mdk.i586.rpm
9f95def40b777f13fc8339bf321b9547  8.0/RPMS/xinetd-ipv6-2.3.0-1.1mdk.i586.rpm
5820ae84905e550320601fe422a9a1b4  8.0/SRPMS/xinetd-2.3.0-1.1mdk.src.rpm




To upgrade automatically, use MandrivaUpdate.


Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.