From owner-freebsd-current Fri Oct 20 18:28:45 1995 Return-Path: owner-current Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id SAA27800 for current-outgoing; Fri, 20 Oct 1995 18:28:45 -0700 Received: from pelican.com (pelican.com [134.24.4.62]) by freefall.freebsd.org (8.6.12/8.6.6) with SMTP id SAA27794 for ; Fri, 20 Oct 1995 18:28:41 -0700 Received: from puffin.pelican.com by pelican.com with smtp (Smail3.1.28.1 #5) id m0t6Sjj-000K2qC; Fri, 20 Oct 95 18:28 WET DST Received: by puffin.pelican.com (Smail3.1.29.1 #9) id m0t6Sjh-0000ReC; Fri, 20 Oct 95 18:28 PDT Message-Id: From: pete@puffin.pelican.com (Pete Carah) Subject: syslog curiosity To: current@freebsd.org Date: Fri, 20 Oct 1995 18:28:33 -0700 (PDT) X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 874 Sender: owner-current@freebsd.org Precedence: bulk Wondered about our syslog(3); at a first glance (in 'stable') it looks OK but wondered... ----------------------------------------------------------- ============================================================================= CA-95:13 CERT Advisory October 19, 1995 Syslog Vulnerability - A Workaround for Sendmail ----------------------------------------------------------------------------- The CERT Coordination Center has received reports of problems with the syslog(3) subroutine. To the best of our current knowledge, the problem is present in virtually all versions of the UNIX Operating System except the following: Sony's NEWS-OS 6.X SunOS 5.5 (Solaris 2.5) Linux with libc version 4.7.2, released May 1995 ----...... (rest omitted) -- Pete