- Issued:
- 2008-05-21
- Updated:
- 2008-05-21
RHBA-2008:0043 - Bug Fix Advisory
Synopsis
sysklogd bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated sysklogd package that fixes several bugs is now available.
Description
The sysklogd package contains two system utilities (syslogd and klogd) that
provide support for system logging. Syslogd and klogd run as daemons and
log system messages such as sendmail logs, security logs, and error logs to
various places.
This updated package fixes the following bugs:
- the sysklogd init script would return incorrect error codes, which would
also prevent the status command from returning correct values.
- syslogd was not able to log messages to an alternative filesystem
location in addition to the default location, /dev/log, because it would
ignore additional socket files in certain circumstances.
- a memory leak in syslogd.
Users of the sysklogd package are advised to upgrade to this updated
package, which includes these fixes.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 245327 - Wrong init script
- BZ - 275041 - Syslogd ignores additional socket file, only references /dev/log
- BZ - 399271 - syslogd memory leak
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
sysklogd-1.4.1-42.el5.src.rpm | SHA-256: 5eca44c7551eeef7f739ff3a10b9dc8de83df0fc89fe82fe5e2fc657adc08975 |
x86_64 | |
sysklogd-1.4.1-42.el5.x86_64.rpm | SHA-256: d357334e2865fea3699da9b40450197d24c25508393f675bf35ec65046d1b5d1 |
ia64 | |
sysklogd-1.4.1-42.el5.ia64.rpm | SHA-256: b2578418b0f4fe81445a979c8d6cf1217c5e52761a88600c106b793872402cfb |
i386 | |
sysklogd-1.4.1-42.el5.i386.rpm | SHA-256: cafc0dcf72e2982823ca6e7f16c7671d128aa8da56848405829ddacf88ca7fb3 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
sysklogd-1.4.1-42.el5.src.rpm | SHA-256: 5eca44c7551eeef7f739ff3a10b9dc8de83df0fc89fe82fe5e2fc657adc08975 |
x86_64 | |
sysklogd-1.4.1-42.el5.x86_64.rpm | SHA-256: d357334e2865fea3699da9b40450197d24c25508393f675bf35ec65046d1b5d1 |
i386 | |
sysklogd-1.4.1-42.el5.i386.rpm | SHA-256: cafc0dcf72e2982823ca6e7f16c7671d128aa8da56848405829ddacf88ca7fb3 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
sysklogd-1.4.1-42.el5.src.rpm | SHA-256: 5eca44c7551eeef7f739ff3a10b9dc8de83df0fc89fe82fe5e2fc657adc08975 |
x86_64 | |
sysklogd-1.4.1-42.el5.x86_64.rpm | SHA-256: d357334e2865fea3699da9b40450197d24c25508393f675bf35ec65046d1b5d1 |
i386 | |
sysklogd-1.4.1-42.el5.i386.rpm | SHA-256: cafc0dcf72e2982823ca6e7f16c7671d128aa8da56848405829ddacf88ca7fb3 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
sysklogd-1.4.1-42.el5.src.rpm | SHA-256: 5eca44c7551eeef7f739ff3a10b9dc8de83df0fc89fe82fe5e2fc657adc08975 |
s390x | |
sysklogd-1.4.1-42.el5.s390x.rpm | SHA-256: 6c146b698c69e7ccf4b5efe0ad8ef5ca9f2ac9075ef85a076ca64e31ba93c415 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
sysklogd-1.4.1-42.el5.src.rpm | SHA-256: 5eca44c7551eeef7f739ff3a10b9dc8de83df0fc89fe82fe5e2fc657adc08975 |
ppc | |
sysklogd-1.4.1-42.el5.ppc.rpm | SHA-256: 9ee3e5fdd38b886019e44f17228f8fc074834c8efc7e0abc82e2fbf410029f24 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
sysklogd-1.4.1-42.el5.src.rpm | SHA-256: 5eca44c7551eeef7f739ff3a10b9dc8de83df0fc89fe82fe5e2fc657adc08975 |
x86_64 | |
sysklogd-1.4.1-42.el5.x86_64.rpm | SHA-256: d357334e2865fea3699da9b40450197d24c25508393f675bf35ec65046d1b5d1 |
i386 | |
sysklogd-1.4.1-42.el5.i386.rpm | SHA-256: cafc0dcf72e2982823ca6e7f16c7671d128aa8da56848405829ddacf88ca7fb3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.