Linux Security
    Linux Security
    Linux Security

    Debian: 'sysklogd' vulnerability

    Date
    2847
    Posted By
    Multiple vulnerabilities have been reported in syslogd and klogd.
    -----BEGIN PGP SIGNED MESSAGE-----
    
    - ----------------------------------------------------------------------------
    Debian Security Advisory                                 This email address is being protected from spambots. You need JavaScript enabled to view it. 
    https://www.debian.org/security/                                Michael Stone
    September 19, 2000
    - ----------------------------------------------------------------------------
    
    Package: sysklogd
    Vulnerability: root exploit
    Debian-specific: no
    
    Multiple vulnerabilities have been reported in syslogd and klogd. A
    local root exploit is possible, and remote exploits may be possible in
    some cases (though we are not currently aware of a remote exploit.)
    
    Fixed packages are available in version 1.3-31.slink1 for Debian 2.1
    (slink) and version 1.3-33.1 for Debian 2.2 (potato). We recommend
    upgrading your sysklogd package immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.1 (alias slink)
    - ----------------------------------
      
      We are releasing slink packages for i386 at this time. m68k packages
      will be available at  https://security.debian.org/
      
      Source archives:
     
    https://security.debian.org/dists/slink/updates/source/sysklogd_1.3.orig.tar.gz
          MD5 checksum: 2e84beeafe23653205f3d3bf47a3a6bb
     
    https://security.debian.org/dists/slink/updates/source/sysklogd_1.3-31.slink1.diff.gz  
          MD5 checksum: 8dd9c4b948b51b9eb685deea4fab3855
     
    https://security.debian.org/dists/slink/updates/source/sysklogd_1.3-31.slink1.dsc
          MD5 checksum: 4f0820b82e169c112bdc785b9fc6671f
    
      Intel ia32 architecture:
        
    https://security.debian.org/dists/slink/updates/binary-i386/sysklogd_1.3-31.slink1_i386.deb
          MD5 checksum: 2d66ce993f7340742935f62a2d299233
    
    Debian GNU/Linux 2.2 (alias potato)
    - -----------------------------------
    
      Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
      architectures. At this moment packages for m68k and powerpc are not
      yet available. As soon as they are ready we will put them online and
      list them on the security pages at  https://security.debian.org/.
    
      Source archives:
        
    https://security.debian.org/dists/potato/updates/main/source/sysklogd_1.3-33.1.diff.gz
          MD5 checksum: 92b0b4b2a442c1e2a791980ac1e0863d
        
    https://security.debian.org/dists/potato/updates/main/source/sysklogd_1.3-33.1.dsc
          MD5 checksum: 4b522c8b0a2074c776d6faa2660cfee7
        
    https://security.debian.org/dists/potato/updates/main/source/sysklogd_1.3.orig.tar.gz
          MD5 checksum: 2e84beeafe23653205f3d3bf47a3a6bb
    
      Alpha architecture:
        
    https://security.debian.org/dists/potato/updates/main/binary-alpha/sysklogd_1.3-33.1_alpha.deb
          MD5 checksum: 357088a0d8519f8b510760e7f25bdd4f
    
      ARM architecture:
        
    https://security.debian.org/dists/potato/updates/main/binary-arm/sysklogd_1.3-33.1_arm.deb
          MD5 checksum: d8d6888e635c121afa8c9dfa9e223046
    
      Intel ia32 architecture:
        
    https://security.debian.org/dists/potato/updates/main/binary-i386/sysklogd_1.3-33.1_i386.deb
          MD5 checksum: 98826c90c295cf4a42ba71d499c097f9
    
      Sun Sparc architecture:
        
    https://security.debian.org/dists/potato/updates/main/binary-sparc/sysklogd_1.3-33.1_sparc.deb
          MD5 checksum: 2f3c6a50922a6392d3ad68f1d8b6a754
    
    
    - ----------------------------------------------------------------------------
    For apt-get: deb  https://security.debian.org/ potato/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/potato/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3ia
    Charset: noconv
    
    iQCVAwUBOcegkg0hVr09l8FJAQFCFQP9FLveD/msoidM/YS10Bxv7BOGKZWZGtQW
    yddg6s2FcoRy//IbxO8NrJbfTodGS/4CY4/84Blb2I8nbuT2w8ZrjFvsGJCg9YUQ
    ZlQ8N+4mZUte1AqLJQxRPlWK+KiBdHTEmq/Ta3y6tu4riYpHxxeHFKu3kVK3PugA
    P/k44fP8zcw=
    =Wm10
    -----END PGP SIGNATURE-----
    

    Advisories

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/36-have-you-ever-used-tcpdump-for-network-troubleshooting-or-debugging?task=poll.vote&format=json
    36
    radio
    [{"id":"125","title":"Yes","votes":"43","type":"x","order":"1","pct":82.69,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":17.31,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.