SCIENTIFIC-LINUX-ERRATA Archives

October 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 9 Oct 2013 13:24:44 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (30 lines)
Synopsis:          Moderate: xinetd security update
Advisory ID:       SLSA-2013:1409-1
Issue Date:        2013-10-07
CVE Numbers:       CVE-2013-4342
--

It was found that xinetd ignored the user and group configuration
directives for services running under the tcpmux-server service. This flaw
could cause the associated services to run as root. If there was a flaw in
such a service, a remote attacker could use it to execute arbitrary code
with the privileges of the root user. (CVE-2013-4342)
--

SL5
  x86_64
    xinetd-2.3.14-20.el5_10.x86_64.rpm
    xinetd-debuginfo-2.3.14-20.el5_10.x86_64.rpm
  i386
    xinetd-2.3.14-20.el5_10.i386.rpm
    xinetd-debuginfo-2.3.14-20.el5_10.i386.rpm
SL6
  x86_64
    xinetd-2.3.14-39.el6_4.x86_64.rpm
    xinetd-debuginfo-2.3.14-39.el6_4.x86_64.rpm
  i386
    xinetd-2.3.14-39.el6_4.i686.rpm
    xinetd-debuginfo-2.3.14-39.el6_4.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2