A vulnerability in xinetd could lead to privilege escalation.
|Package||sys-apps/xinetd on all architectures|
|Affected versions||< 2.3.15-r2|
|Unaffected versions||>= 2.3.15-r2|
xinetd is a secure replacement for inetd.
Xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root.
Attackers could escalate privileges outside of the running process.
There is no known workaround at this time.
All xinetd users should upgrade to the latest version:
# emerge --sync # emerge --ask --verbose --oneshot ">=sys-apps/xinetd-2.3.15-r2"
November 15, 2016
November 15, 2016: 1