Updated xinetd package fixes security vulnerabilityPublication date: 09 Oct 2013
Affected Mageia releases : 2 , 3
It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user (CVE-2013-4342).