[18242] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [RHSA-2000:061-02] syslog format vulnerability in klogd

daemon@ATHENA.MIT.EDU (Pekka Savola)
Wed Dec 20 18:01:12 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.30.0012200130330.26344-100000@netcore.fi>
Date:         Wed, 20 Dec 2000 01:33:42 +0200
Reply-To: Pekka Savola <pekkas@NETCORE.FI>
From: Pekka Savola <pekkas@NETCORE.FI>
X-To:         Lionel Cons <lionel.cons@CERN.CH>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000919104833.81@c699100c9b5badcc26efde58cf40aac9>

On Tue, 19 Sep 2000, Lionel Cons wrote:
> bugzilla@REDHAT.COM writes:
>  > Various vulnerabilities exist in syslogd/klogd. [...]
>  >
>  > 4. Solution:
>  >
>  > For each RPM for your particular architecture, run:
>  >
>  > rpm -Fvh [filename]
>  >
>  > where filename is the name of the RPM.
>
> I have the impression that this is not enough as the old buggy daemons
> still run. It seems necessary to run:
> 	# /etc/rc.d/init.d/syslog restart
>
> (Red Hat, could you add this to the rpm post install script?)

These steps have been taken for granted in the past.  Of course, the
wording could be a little more precise.

Red Hat Linux 7 automatically restarts services if running (with
'condrestart') when they're upgraded.  This is a new feature.

--
Pekka Savola                    "Tell me of difficulties surmounted,
Netcore Oy                      not those you stumble over and fall"
Systems. Networks. Security.     -- Robert Jordan: A Crown of Swords

home help back first fref pref prev next nref lref last post