[18188] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [RHSA-2000:061-02] syslog format vulnerability in klogd

daemon@ATHENA.MIT.EDU (Lionel Cons)
Tue Dec 19 17:52:01 2000

MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID:  <20000919104833.81@c699100c9b5badcc26efde58cf40aac9>
Date:         Tue, 19 Sep 2000 10:53:23 +0200
Reply-To: Lionel Cons <lionel.cons@CERN.CH>
From: Lionel Cons <lionel.cons@CERN.CH>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200009181942.PAA16899@lacrosse.corp.redhat.com>

bugzilla@REDHAT.COM writes:
 > Various vulnerabilities exist in syslogd/klogd. [...]
 >
 > 4. Solution:
 >
 > For each RPM for your particular architecture, run:
 >
 > rpm -Fvh [filename]
 >
 > where filename is the name of the RPM.

I have the impression that this is not enough as the old buggy daemons
still run. It seems necessary to run:
	# /etc/rc.d/init.d/syslog restart

(Red Hat, could you add this to the rpm post install script?)

________________________________________________________
Lionel Cons        http://home.cern.ch/~cons
CERN               http://www.cern.ch

Hinds' 1st Law of Computer Programming
	Any given program, when running, is obsolete.

home help back first fref pref prev next nref lref last post