- Issued:
- 2011-02-16
- Updated:
- 2011-02-16
RHBA-2011:0225 - Bug Fix Advisory
Synopsis
sysklogd bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated sysklogd package that fixes multiple bugs is now available for Red
Hat Enterprise Linux 4.
Description
The sysklogd package contains two system utilities (syslogd and klogd) that
provide support for system logging. Syslogd and klogd run as daemons and log
system messages such as sendmail logs, security logs, and error logs to various
places.
This update fixes the following bugs:
- Previously, syslogd called ctime() which locked a fast userspace mutex (futex)
when a message was logged. If at the same moment also a MARK message alarm
occured then the ctime() was called from the signal handler and the futex was
not released. With this update, syslogd does no longer generate any input/output
nor does it call ctime() in the signal handler. (BZ#491637)
- Previously, the syslog daemon could receive the signal "SIGALRM" when users
ran the writev() function. Due to this behavior, syslogd stopped to write
messages to /dev/console. This update reschedules the ALARM just prior to call
writev(). Now, syslogd continues to write messages to /dev/console. (BZ#500354)
- Previously, the errno value of "select" was checked after the "Mark" message
logging functions reset this value from EINTR to EINVAL. Due to this behavior,
the -m option with nonzero arguments resulted in incorrect 'select: Invalid
argument' messages in the log. This update stores the errno value from "select"
to the new variable. No more incorrect error messages are logged. (BZ#625795)
All sysklog users are advised to upgrade to this updated package, which resolves
these issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 491637 - possible deadlock in ctime() called from signal handler
- BZ - 500354 - syslogd stops writing any messages to /dev/console after an EINTR in syscall
- BZ - 625795 - Using -m option results in 'select: Invalid argument' messages in the log
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
sysklogd-1.4.1-30.el4.src.rpm | SHA-256: 56a7b9a76b9fb6acae3232b1b142f3fcb3299a5e4b6c9bf9f6b14b60b7b565c3 |
x86_64 | |
sysklogd-1.4.1-30.el4.x86_64.rpm | SHA-256: 0cfc83f16d76181b0ae687bc713f769d290704e519514f6beafde274d6661505 |
sysklogd-1.4.1-30.el4.x86_64.rpm | SHA-256: 0cfc83f16d76181b0ae687bc713f769d290704e519514f6beafde274d6661505 |
ia64 | |
sysklogd-1.4.1-30.el4.ia64.rpm | SHA-256: 71288b696023827697dd6e9363cf8c9c73baacdfba0e9da4296ab33be48f6d73 |
sysklogd-1.4.1-30.el4.ia64.rpm | SHA-256: 71288b696023827697dd6e9363cf8c9c73baacdfba0e9da4296ab33be48f6d73 |
i386 | |
sysklogd-1.4.1-30.el4.i386.rpm | SHA-256: 24ca060419d3afc62d1cb6f953de826c4be7259eb125fe1064c77cf9a44c2e50 |
sysklogd-1.4.1-30.el4.i386.rpm | SHA-256: 24ca060419d3afc62d1cb6f953de826c4be7259eb125fe1064c77cf9a44c2e50 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
sysklogd-1.4.1-30.el4.src.rpm | SHA-256: 56a7b9a76b9fb6acae3232b1b142f3fcb3299a5e4b6c9bf9f6b14b60b7b565c3 |
x86_64 | |
sysklogd-1.4.1-30.el4.x86_64.rpm | SHA-256: 0cfc83f16d76181b0ae687bc713f769d290704e519514f6beafde274d6661505 |
ia64 | |
sysklogd-1.4.1-30.el4.ia64.rpm | SHA-256: 71288b696023827697dd6e9363cf8c9c73baacdfba0e9da4296ab33be48f6d73 |
i386 | |
sysklogd-1.4.1-30.el4.i386.rpm | SHA-256: 24ca060419d3afc62d1cb6f953de826c4be7259eb125fe1064c77cf9a44c2e50 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
sysklogd-1.4.1-30.el4.src.rpm | SHA-256: 56a7b9a76b9fb6acae3232b1b142f3fcb3299a5e4b6c9bf9f6b14b60b7b565c3 |
x86_64 | |
sysklogd-1.4.1-30.el4.x86_64.rpm | SHA-256: 0cfc83f16d76181b0ae687bc713f769d290704e519514f6beafde274d6661505 |
i386 | |
sysklogd-1.4.1-30.el4.i386.rpm | SHA-256: 24ca060419d3afc62d1cb6f953de826c4be7259eb125fe1064c77cf9a44c2e50 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
sysklogd-1.4.1-30.el4.src.rpm | SHA-256: 56a7b9a76b9fb6acae3232b1b142f3fcb3299a5e4b6c9bf9f6b14b60b7b565c3 |
s390x | |
sysklogd-1.4.1-30.el4.s390x.rpm | SHA-256: 5fdc866e7aca451fd69fde6a1156e935a6cf510c15af57e4805097ca316032b8 |
s390 | |
sysklogd-1.4.1-30.el4.s390.rpm | SHA-256: c420d09b5eaea2b163df68e3d38d4b8fae9f24319bc20e4e676c952a9b2c29e9 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
sysklogd-1.4.1-30.el4.src.rpm | SHA-256: 56a7b9a76b9fb6acae3232b1b142f3fcb3299a5e4b6c9bf9f6b14b60b7b565c3 |
ppc | |
sysklogd-1.4.1-30.el4.ppc.rpm | SHA-256: be4d7730ffac0ad1dbe19cd548c3ba999c76df43a086c4ee6564537ffa22a557 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.