A vulnerability in xinetd could lead to privilege escalation.
| Package | sys-apps/xinetd on all architectures | 
|---|---|
| Affected versions | < 2.3.15-r2 | 
| Unaffected versions | >= 2.3.15-r2 | 
xinetd is a secure replacement for inetd.
Xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root.
Attackers could escalate privileges outside of the running process.
There is no known workaround at this time.
All xinetd users should upgrade to the latest version:
# emerge --sync # emerge --ask --verbose --oneshot ">=sys-apps/xinetd-2.3.15-r2"
      Release date
      
      November 15, 2016
    
      Latest revision
      
      November 15, 2016: 1
    
      Severity
      
      normal
    
      Exploitable
      
      remote
    
Bugzilla entries