We're using syslog-ng 1.6.0rc3 and Perl 5.6.1 and SA 3 RC1, and have
found that the following sequence will cause a spamd fork bomb:

 1. Using the RH init script, start spamd (-d -x -u mail -D)
 2. Restart syslog-ng.
 3. Attempt to stop spamd with the RH init script.

        At this point the system becomes a spamd fork bomb.  We didn't see
this with SA 2.6.

        Is one of our packages (syslog-ng or perl) out of date?  Or is this
a real spamd bug?

 Thanks,
 Chris

Reply via email to