Debian: 'sysklogd' vulnerability

    Date19 Sep 2000
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities have been reported in syslogd and klogd.
    - ----------------------------------------------------------------------------
    Debian Security Advisory                                 This email address is being protected from spambots. You need JavaScript enabled to view it.                                Michael Stone
    September 19, 2000
    - ----------------------------------------------------------------------------
    Package: sysklogd
    Vulnerability: root exploit
    Debian-specific: no
    Multiple vulnerabilities have been reported in syslogd and klogd. A
    local root exploit is possible, and remote exploits may be possible in
    some cases (though we are not currently aware of a remote exploit.)
    Fixed packages are available in version 1.3-31.slink1 for Debian 2.1
    (slink) and version 1.3-33.1 for Debian 2.2 (potato). We recommend
    upgrading your sysklogd package immediately.
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    Debian GNU/Linux 2.1 (alias slink)
    - ----------------------------------
      We are releasing slink packages for i386 at this time. m68k packages
      will be available at
      Source archives:

          MD5 checksum: 2e84beeafe23653205f3d3bf47a3a6bb
          MD5 checksum: 8dd9c4b948b51b9eb685deea4fab3855

          MD5 checksum: 4f0820b82e169c112bdc785b9fc6671f
      Intel ia32 architecture:
          MD5 checksum: 2d66ce993f7340742935f62a2d299233
    Debian GNU/Linux 2.2 (alias potato)
    - -----------------------------------
      Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
      architectures. At this moment packages for m68k and powerpc are not
      yet available. As soon as they are ready we will put them online and
      list them on the security pages at
      Source archives:
          MD5 checksum: 92b0b4b2a442c1e2a791980ac1e0863d
          MD5 checksum: 4b522c8b0a2074c776d6faa2660cfee7
          MD5 checksum: 2e84beeafe23653205f3d3bf47a3a6bb
      Alpha architecture:
          MD5 checksum: 357088a0d8519f8b510760e7f25bdd4f
      ARM architecture:
          MD5 checksum: d8d6888e635c121afa8c9dfa9e223046
      Intel ia32 architecture:
          MD5 checksum: 98826c90c295cf4a42ba71d499c097f9
      Sun Sparc architecture:
          MD5 checksum: 2f3c6a50922a6392d3ad68f1d8b6a754
    - ----------------------------------------------------------------------------
    For apt-get: deb potato/updates main
    For dpkg-ftp: dists/potato/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Version: 2.6.3ia
    Charset: noconv
    -----END PGP SIGNATURE-----
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.26,"resources":[]},{"id":"88","title":"Should be more technical","votes":"16","type":"x","order":"2","pct":13.68,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.06,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.