Security update for xinetd
SUSE Security Update: Security update for xinetd
The multiplexing system xinetd was updated to fix security
issues and a bug.
Security issues fixed:
* CVE-2013-4342: xinetd ignores user and group
directives for tcpmux services.
* CVE-2012-0862: xinetd enables all services when tcp
multiplexing is used.
Bug fixed:
* Services started by xinetd were limited to 1024 open
file descriptors. (bnc#855685)
Security Issues references:
* CVE-2012-0862
>
* CVE-2013-4342
>
Announcement ID: | SUSE-SU-2014:0466-1 |
Rating: | moderate |
References: | #762294 #844230 #855685 |
Affected Products: |
An update that solves two vulnerabilities and has one errata is now available.
Description:
The multiplexing system xinetd was updated to fix security
issues and a bug.
Security issues fixed:
* CVE-2013-4342: xinetd ignores user and group
directives for tcpmux services.
* CVE-2012-0862: xinetd enables all services when tcp
multiplexing is used.
Bug fixed:
* Services started by xinetd were limited to 1024 open
file descriptors. (bnc#855685)
Security Issues references:
* CVE-2012-0862
* CVE-2013-4342
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-xinetd-9021
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-xinetd-9021
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-xinetd-9021
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
- xinetd-2.3.14-130.133.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
- xinetd-2.3.14-130.133.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
- xinetd-2.3.14-130.133.1
References:
- http://support.novell.com/security/cve/CVE-2012-0862.html
- http://support.novell.com/security/cve/CVE-2013-4342.html
- https://bugzilla.novell.com/762294
- https://bugzilla.novell.com/844230
- https://bugzilla.novell.com/855685
- http://download.suse.com/patch/finder/?keywords=82ad1668f5a536fb415b95faf253f10d