Red Hat: 'inetd' vulnerability
Summary
Summary
The inetd server as shipped with Red Hat Linux 6.2 fails to close socketsfor internal service properly. This could make services stop working whenthe system had leaked sufficient resources.Note that all of these services are turned off in the default configuration.
Solution
To update all RPMs for your particular architecture, run:
rpm -Fvh
where
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed ( for more info):
16729 - inetd does not close connection when daytime service is called
15908 - Misspelled variable in inetd start script
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
alpha:
i386:
sparc:
7. Verification:
MD5 sum Package Name
82ca947aecbd065673a96ef25f3b3460 6.2/SRPMS/inetd-0.16-7.src.rpm
96e032a76fdc0a9dbb1e42c937b54831 6.2/alpha/inetd-0.16-7.alpha.rpm
60ad8ad297b03a9b90e69a2e5c06c185 6.2/i386/inetd-0.16-7.i386.rpm
0a76edd3ef240e6e4da5382a359b7850 6.2/sparc/inetd-0.16-7.sparc.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
You can verify each package with the following command:
rpm --checksig
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg
References
Copyright(c) 2000, 2001 Red Hat, Inc. `
Package List
Topic
Topic
The inetd server as shipped with Red Hat Linux 6.2 fails to close sockets
for internal services properly.
Relevant Releases Architectures
Red Hat Linux 6.2 - alpha, i386, sparc
Bugs Fixed