From: dburcaw@newhope.terraplex.com
To: yellowdog-updates@lists.yellowdoglinux.com
Subject: [yellowdog-updates] Yellow Dog Linux Security Advisory: YDU-20010725-10
Date: 9 Aug 2001 22:22:43 -0000
Yellow Dog Linux Security Announcement
--------------------------------------
Package: xinetd
Issue Date: July 25, 2001
Priority: medium
Advisory ID: YDU-20010725-10
1. Topic:
A string handling vulnerability was discovered in xinetd.
2. Problem:
"A boundary checking case in xinetd's string handling was
fixed in the 2.3.0 release of xinetd."
(from Red Hat's security advisory)
3. Solution:
a) Updating via yup...
We suggest that you use the Yellow Dog Update Program (yup)
to keep your system up-to-date. The following command(s) will
automatically retrieve and install the fixed version of
this update onto your system:
yup update xinetd
b) Updating manually...
The update can also be retrieved manually from our ftp site
below along with the rpm command that should be used to install
the update. (Please use a mirror site)
ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.0/ppc/RPMS/
rpm -Fvh xinetd-2.3.0-1.71.ppc.rpm
4. Verification
MD5 checksum Package
-------------------------------- ----------------------------
4d5ea9692e93b2d9b9092f266e00db67 SRPMS/xinetd-2.3.0-1.71.src.rpm
90ce976098ed5b51efc1030c01a18177 ppc/RPMS/xinetd-2.3.0-1.71.ppc.rpm
If you wish to verify that each package has not been corrupted or tampered with,
examine the md5sum with the following command: rpm --checksig --nogpg filename
5. Misc.
Terra Soft has setup a moderated mailing list where these security, bugfix, and package
enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more
information.
For information regarding the usage of yup, the Yellow Dog Update Program, see
http://devel.yellowdoglinux.com/rp_yup.shtml