Linux Today: Linux News On Internet Time.

Mandrake Linux Security Update Advisory: xinetd

Jul 06, 2001, 16:00 (0 Talkback[s])

                Mandrake Linux Security Update Advisory

Package name:           xinetd
Date:                   July 5th, 2001
Original Advisory Date: June 11th, 2001
Advisory ID:            MDKSA-2001:055-1

Affected versions:      7.2, 8.0, Single Network Firewall 7.2

Problem Description:

 A bug exists in xinetd as shipped with Mandrake Linux 8.0 dealing with
 TCP connections with the WAIT state that prevents linuxconf-web from
 working properly.  As well, xinetd contains a security flaw in which
 it defaults to a umask of 0.  This means that applications using the
 xinetd umask that do not set permissions themselves (like SWAT, a web
 configuration tool for Samba), will create world writable files.  This
 update sets the default umask to 022.


 This update forces the TMPDIR to /tmp instead of obtaining it from the
 root user by default, which uses /root/tmp.  As well, this version of
 xinetd also fixed a possible buffer overflow in the logging code that
 was reported by zen-parse on bugtraq, but was not mentioned in the
 previous advisory.



Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:
  rpm --checksig package.rpm
You can get the GPG public key of the Mandrake Linux Security Team at
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.

Linux-Mandrake 7.2:
681f8a35afdaea2781d4fc32d93993ab  7.2/RPMS/xinetd-2.3.0-1.2mdk.i586.rpm
1b3650c4d3bf4f110a795639fbf4000b  7.2/SRPMS/xinetd-2.3.0-1.2mdk.src.rpm

Mandrake Linux 8.0:
d9e1bdc5a29712a75608c4753f6d6490  8.0/RPMS/xinetd-2.3.0-1.1mdk.i586.rpm
9f95def40b777f13fc8339bf321b9547  8.0/RPMS/xinetd-ipv6-2.3.0-1.1mdk.i586.rpm
5820ae84905e550320601fe422a9a1b4  8.0/SRPMS/xinetd-2.3.0-1.1mdk.src.rpm

Single Network Firewall 7.2:
681f8a35afdaea2781d4fc32d93993ab  snf7.2/RPMS/xinetd-2.3.0-1.2mdk.i586.rpm
1b3650c4d3bf4f110a795639fbf4000b  snf7.2/SRPMS/xinetd-2.3.0-1.2mdk.src.rpm

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

3610 - linuxconf denial of service

To upgrade automatically, use MandrakeUpdate.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".

You can download the updates directly from one of the mirror sites
listed at:


Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Mandrake Linux 8.0, look for it in "updates/8.0/RPMS/".  Updated source
RPMs are available as well, but you generally do not need to download

Please be aware that sometimes it takes the mirrors a few hours to

You can view other security advisories for Mandrake Linux at:


If you want to report vulnerabilities, please contact


Mandrake Linux has two security-related mailing list services that
anyone can subscribe to:


  Mandrake Linux's security announcements mailing list.  Only
  announcements are sent to this list and it is read-only.


  Mandrake Linux's security discussion mailing list.  This list is open
  to anyone to discuss Mandrake Linux security specifically and Linux
  security in general.

To subscribe to either list, send a message to
with "subscribe [listname]" in the body of the message.

To remove yourself from either list, send a message to
with "unsubscribe [listname]" in the body of the message.

To get more information on either list, send a message to
with "info [listname]" in the body of the message.

Optionally, you can use the web interface to subscribe to or unsubscribe
from either list:


Related Stories: