sysklogdSecurity ReportsCVE-2000-0867Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages. Fixed in klogd.c. CVE-2001-0738LogLine function in klogd in sysklogd 1.3 in various Linux distributions allows an attacker to cause a denial of service (hang) by causing null bytes to be placed in log messages. Fixed in klogd.c. Referenced as VU#249579 and Bug#85478. MDKSA-2004:038Steve Grubb discovered a bug in sysklogd where it allocates an insufficient amount of memory which causes sysklogd to write to unallocated memory. This could allow for a malicious user to crash sysklogd. The updated packages provide a patched sysklogd using patches from Openwall to correct the problem and also corrects the use of an unitialized variable (a previous use of "count"). Both bugs are bugs and are fixed in the CVS repository but they
don't pose any security risks since they can only be triggered by a
malicious commandline which can only be constructed by
Referenced as Bug#246535.
|
|