- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHBA-2008:0162 - Bug Fix Advisory
Synopsis
sysklogd bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated sysklogd package that fixes various bugs is now available.
Description
The sysklogd package contains two system utilities (syslogd and klogd) that
provide support for system logging. Syslogd and klogd run as daemons and
log system messages such as sendmail logs, security logs, and error logs to
various places.
This updated sysklogd package includes fixes for the following bugs:
- the init script for the sysklogd daemon would sometimes exit with
incorrect or invalid return codes, thus causing the 'status' command to
return an incorrect value. This has been fixed so that the init script is
compliant with Linux Standard Base (LSB) guidelines, which resolves these
issues.
- the syslog init script, located at /etc/init.d/syslog, claimed that
syslog did not support reloading, and reload was improperly implemented.
This has been fixed so that syslog responds correctly to the reload command.
- syslogd was not able to log messages to an alternative filesystem
location in addition to the default location, /dev/log, because it would
ignore additional socket files in certain circumstances.
- a memory leak in syslogd.
Users are advised to upgrade to this updated sysklogd package, which
resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 232914 - /etc/init.d/syslog doesn't properly implement reload
- BZ - 245328 - Wrong init script
- BZ - 275031 - Syslogd ignores additional socket file, only references /dev/log
- BZ - 275181 - syslogd memory leak
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
sysklogd-1.4.1-27.el4.src.rpm | SHA-256: b7d4747aa95066d738d57abf30425c5a09cefc0abfdb3fe68f40002086e240d7 |
x86_64 | |
sysklogd-1.4.1-27.el4.x86_64.rpm | SHA-256: aba752e47b1d7eb8896e0ba3897597730e2d598419d35b48880e28d193f1895d |
sysklogd-1.4.1-27.el4.x86_64.rpm | SHA-256: aba752e47b1d7eb8896e0ba3897597730e2d598419d35b48880e28d193f1895d |
ia64 | |
sysklogd-1.4.1-27.el4.ia64.rpm | SHA-256: 42fc149cc19311512cea77fa30886da6aa939899a65490f1afb5863de1600f9e |
sysklogd-1.4.1-27.el4.ia64.rpm | SHA-256: 42fc149cc19311512cea77fa30886da6aa939899a65490f1afb5863de1600f9e |
i386 | |
sysklogd-1.4.1-27.el4.i386.rpm | SHA-256: 6192de302d032e5db1198dc1408e137ea05c39545a7f3310f46dd04739927598 |
sysklogd-1.4.1-27.el4.i386.rpm | SHA-256: 6192de302d032e5db1198dc1408e137ea05c39545a7f3310f46dd04739927598 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
sysklogd-1.4.1-27.el4.src.rpm | SHA-256: b7d4747aa95066d738d57abf30425c5a09cefc0abfdb3fe68f40002086e240d7 |
x86_64 | |
sysklogd-1.4.1-27.el4.x86_64.rpm | SHA-256: aba752e47b1d7eb8896e0ba3897597730e2d598419d35b48880e28d193f1895d |
ia64 | |
sysklogd-1.4.1-27.el4.ia64.rpm | SHA-256: 42fc149cc19311512cea77fa30886da6aa939899a65490f1afb5863de1600f9e |
i386 | |
sysklogd-1.4.1-27.el4.i386.rpm | SHA-256: 6192de302d032e5db1198dc1408e137ea05c39545a7f3310f46dd04739927598 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
sysklogd-1.4.1-27.el4.src.rpm | SHA-256: b7d4747aa95066d738d57abf30425c5a09cefc0abfdb3fe68f40002086e240d7 |
x86_64 | |
sysklogd-1.4.1-27.el4.x86_64.rpm | SHA-256: aba752e47b1d7eb8896e0ba3897597730e2d598419d35b48880e28d193f1895d |
i386 | |
sysklogd-1.4.1-27.el4.i386.rpm | SHA-256: 6192de302d032e5db1198dc1408e137ea05c39545a7f3310f46dd04739927598 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
sysklogd-1.4.1-27.el4.src.rpm | SHA-256: b7d4747aa95066d738d57abf30425c5a09cefc0abfdb3fe68f40002086e240d7 |
s390x | |
sysklogd-1.4.1-27.el4.s390x.rpm | SHA-256: c6e59e08ddce1f90c66bc0d04565ea3479116713565e8ed13a5a33dfc667950e |
s390 | |
sysklogd-1.4.1-27.el4.s390.rpm | SHA-256: a50f8301d8592432eb305e6311e15ae07a8582597ff96fb0d3333d703752bcee |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
sysklogd-1.4.1-27.el4.src.rpm | SHA-256: b7d4747aa95066d738d57abf30425c5a09cefc0abfdb3fe68f40002086e240d7 |
ppc | |
sysklogd-1.4.1-27.el4.ppc.rpm | SHA-256: 208c08c1ac75a1c3f0b5b16fa5bccde08a37a1f1bb04bdf257b82891352b2add |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.