Debian: 'sysklogd' vulnerability

    Date 19 Sep 2000
    Posted By LinuxSecurity Advisories
    Multiple vulnerabilities have been reported in syslogd and klogd.
    - ----------------------------------------------------------------------------
    Debian Security Advisory                                 This email address is being protected from spambots. You need JavaScript enabled to view it.                                Michael Stone
    September 19, 2000
    - ----------------------------------------------------------------------------
    Package: sysklogd
    Vulnerability: root exploit
    Debian-specific: no
    Multiple vulnerabilities have been reported in syslogd and klogd. A
    local root exploit is possible, and remote exploits may be possible in
    some cases (though we are not currently aware of a remote exploit.)
    Fixed packages are available in version 1.3-31.slink1 for Debian 2.1
    (slink) and version 1.3-33.1 for Debian 2.2 (potato). We recommend
    upgrading your sysklogd package immediately.
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    Debian GNU/Linux 2.1 (alias slink)
    - ----------------------------------
      We are releasing slink packages for i386 at this time. m68k packages
      will be available at
      Source archives:

          MD5 checksum: 2e84beeafe23653205f3d3bf47a3a6bb
          MD5 checksum: 8dd9c4b948b51b9eb685deea4fab3855

          MD5 checksum: 4f0820b82e169c112bdc785b9fc6671f
      Intel ia32 architecture:
          MD5 checksum: 2d66ce993f7340742935f62a2d299233
    Debian GNU/Linux 2.2 (alias potato)
    - -----------------------------------
      Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
      architectures. At this moment packages for m68k and powerpc are not
      yet available. As soon as they are ready we will put them online and
      list them on the security pages at
      Source archives:
          MD5 checksum: 92b0b4b2a442c1e2a791980ac1e0863d
          MD5 checksum: 4b522c8b0a2074c776d6faa2660cfee7
          MD5 checksum: 2e84beeafe23653205f3d3bf47a3a6bb
      Alpha architecture:
          MD5 checksum: 357088a0d8519f8b510760e7f25bdd4f
      ARM architecture:
          MD5 checksum: d8d6888e635c121afa8c9dfa9e223046
      Intel ia32 architecture:
          MD5 checksum: 98826c90c295cf4a42ba71d499c097f9
      Sun Sparc architecture:
          MD5 checksum: 2f3c6a50922a6392d3ad68f1d8b6a754
    - ----------------------------------------------------------------------------
    For apt-get: deb potato/updates main
    For dpkg-ftp: dists/potato/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Version: 2.6.3ia
    Charset: noconv
    -----END PGP SIGNATURE-----

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"3","type":"x","order":"1","pct":42.86,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"2","type":"x","order":"3","pct":28.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.