Home > Security > Advisories

Advisories

Mandriva Advisories

Package name xinetd
Date June 11th, 2001
Advisory ID MDKSA-2001:055
Affected versions 7.2, 8.0
Synopsis Updated xinetd packages fix improper umask

Problem Description

A bug exists in xinetd as shipped with Mandrake Linux 8.0 dealing with
TCP connections with the WAIT state that prevents linuxconf-web from
working properly. As well, xinetd contains a security flaw in which
it defaults to a umask of 0. This means that applications using the
xinetd umask that do not set permissions themselves (like SWAT, a web
configuration tool for Samba), will create world writable files. This
update sets the default umask to 022.

Updated Packages

Mandrakelinux 7.2

 dcfddcde15315b6798d4303096eb41b6  7.2/RPMS/xinetd-2.1.8.9pre15-1.2mdk.i586.rpm
06f6fe56ea492d021538863f08c297ce  7.2/SRPMS/xinetd-2.1.8.9pre15-1.2mdk.src.rpm

Mandrakelinux 8.0

 b5e1f34214417502ca891bd3993a50c5  8.0/RPMS/xinetd-2.1.8.9pre15-1.1mdk.i586.rpm
683f1ce09c630432cf5cd876ef9f0f65  8.0/RPMS/xinetd-ipv6-2.1.8.9pre15-1.1mdk.i586.rpm
e6902c3dd3b9c321f41d2bf95d260972  8.0/SRPMS/xinetd-2.1.8.9pre15-1.1mdk.src.rpm

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.