---

Red Hat Bug Fix Advisory: Updated xinetd package is available for Red Hat Linux 7

Date: Thu, 19 Oct 2000 16:09 -0400
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHBA-2000:090-02] Updated xinetd package is available for
Red Hat Linux 7


                   Red Hat, Inc. Bug Fix Advisory

Synopsis:          Updated xinetd package is available for Red Hat Linux 7
Advisory ID:       RHBA-2000:090-02
Issue date:        2000-10-19
Updated on:        2000-10-19
Product:           Red Hat Linux
Keywords:          xinetd tcp_wrappers internal linuxconf only_from
Cross references:  N/A

1. Topic:

xinetd as shipped with Red Hat Linux 7 does not handle the
linuxconf web interface correctly. Internal services (echo,
daytime, time, and chargen) have been added for easier
configuration. In addition, an xinetd-specific way of doing access
control has been fixed.

2. Relevant releases/architectures:

Red Hat Linux 7.0 – i386

3. Problem description:

xinetd as shipped with Red Hat Linux 7 does not handle the
linuxconf web interface correctly. Internal services (echo,
daytime, time, and chargen) have been added for easier
configuration with chkconfig or ntsysv. In addition, an
xinetd-specific way of doing access control (only_from) has been
fixed.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
for more info):

18686 – /etc/hosts causes denial of localhost-only services
18901 – xinetd Time service broken
18221 – linuxconf-web does not work

6. RPMs required:

Red Hat Linux 7.0:

i386:
ftp://updates.redhat.com/7.0/i386/xinetd-2.1.8.9pre11-1.i386.rpm

sources:
ftp://updates.redhat.com/7.0/SRPMS/xinetd-2.1.8.9pre11-1.src.rpm

7. Verification:

MD5 sum                           Package Name

713a6277b44b2374551092eb6f83628d 7.0/SRPMS/xinetd-2.1.8.9pre11-1.src.rpm
fa365da7b350ceb7ce24bc90a1ef8752 7.0/i386/xinetd-2.1.8.9pre11-1.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm –checksig <filename>

If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg <filename>

8. References:

N/A

Copyright(c) 2000 Red Hat, Inc.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis