Linux Security
Linux Security
Linux Security

Debian: 'sysklogd' vulnerability

Date 19 Sep 2000
2933
Posted By LinuxSecurity Advisories
Multiple vulnerabilities have been reported in syslogd and klogd.
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------
Debian Security Advisory                                 This email address is being protected from spambots. You need JavaScript enabled to view it. 
https://www.debian.org/security/                                Michael Stone
September 19, 2000
- ----------------------------------------------------------------------------

Package: sysklogd
Vulnerability: root exploit
Debian-specific: no

Multiple vulnerabilities have been reported in syslogd and klogd. A
local root exploit is possible, and remote exploits may be possible in
some cases (though we are not currently aware of a remote exploit.)

Fixed packages are available in version 1.3-31.slink1 for Debian 2.1
(slink) and version 1.3-33.1 for Debian 2.2 (potato). We recommend
upgrading your sysklogd package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.1 (alias slink)
- ----------------------------------
  
  We are releasing slink packages for i386 at this time. m68k packages
  will be available at  https://security.debian.org/
  
  Source archives:
 
https://security.debian.org/dists/slink/updates/source/sysklogd_1.3.orig.tar.gz
      MD5 checksum: 2e84beeafe23653205f3d3bf47a3a6bb
 
https://security.debian.org/dists/slink/updates/source/sysklogd_1.3-31.slink1.diff.gz  
      MD5 checksum: 8dd9c4b948b51b9eb685deea4fab3855
 
https://security.debian.org/dists/slink/updates/source/sysklogd_1.3-31.slink1.dsc
      MD5 checksum: 4f0820b82e169c112bdc785b9fc6671f

  Intel ia32 architecture:
    
https://security.debian.org/dists/slink/updates/binary-i386/sysklogd_1.3-31.slink1_i386.deb
      MD5 checksum: 2d66ce993f7340742935f62a2d299233

Debian GNU/Linux 2.2 (alias potato)
- -----------------------------------

  Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
  architectures. At this moment packages for m68k and powerpc are not
  yet available. As soon as they are ready we will put them online and
  list them on the security pages at  https://security.debian.org/.

  Source archives:
    
https://security.debian.org/dists/potato/updates/main/source/sysklogd_1.3-33.1.diff.gz
      MD5 checksum: 92b0b4b2a442c1e2a791980ac1e0863d
    
https://security.debian.org/dists/potato/updates/main/source/sysklogd_1.3-33.1.dsc
      MD5 checksum: 4b522c8b0a2074c776d6faa2660cfee7
    
https://security.debian.org/dists/potato/updates/main/source/sysklogd_1.3.orig.tar.gz
      MD5 checksum: 2e84beeafe23653205f3d3bf47a3a6bb

  Alpha architecture:
    
https://security.debian.org/dists/potato/updates/main/binary-alpha/sysklogd_1.3-33.1_alpha.deb
      MD5 checksum: 357088a0d8519f8b510760e7f25bdd4f

  ARM architecture:
    
https://security.debian.org/dists/potato/updates/main/binary-arm/sysklogd_1.3-33.1_arm.deb
      MD5 checksum: d8d6888e635c121afa8c9dfa9e223046

  Intel ia32 architecture:
    
https://security.debian.org/dists/potato/updates/main/binary-i386/sysklogd_1.3-33.1_i386.deb
      MD5 checksum: 98826c90c295cf4a42ba71d499c097f9

  Sun Sparc architecture:
    
https://security.debian.org/dists/potato/updates/main/binary-sparc/sysklogd_1.3-33.1_sparc.deb
      MD5 checksum: 2f3c6a50922a6392d3ad68f1d8b6a754


- ----------------------------------------------------------------------------
For apt-get: deb  https://security.debian.org/ potato/updates main
For dpkg-ftp:  ftp://security.debian.org/debian-security dists/potato/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQCVAwUBOcegkg0hVr09l8FJAQFCFQP9FLveD/msoidM/YS10Bxv7BOGKZWZGtQW
yddg6s2FcoRy//IbxO8NrJbfTodGS/4CY4/84Blb2I8nbuT2w8ZrjFvsGJCg9YUQ
ZlQ8N+4mZUte1AqLJQxRPlWK+KiBdHTEmq/Ta3y6tu4riYpHxxeHFKu3kVK3PugA
P/k44fP8zcw=
=Wm10
-----END PGP SIGNATURE-----

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.