A vulnerability in xinetd could lead to privilege escalation.
Package | sys-apps/xinetd on all architectures |
---|---|
Affected versions | < 2.3.15-r2 |
Unaffected versions | >= 2.3.15-r2 |
xinetd is a secure replacement for inetd.
Xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root.
Attackers could escalate privileges outside of the running process.
There is no known workaround at this time.
All xinetd users should upgrade to the latest version:
# emerge --sync # emerge --ask --verbose --oneshot ">=sys-apps/xinetd-2.3.15-r2"
Release date
November 15, 2016
Latest revision
November 15, 2016: 1
Severity
normal
Exploitable
remote
Bugzilla entries