Content-Transfer-Encoding: |
7bit |
Sender: |
|
Subject: |
|
From: |
|
Date: |
Wed, 22 Oct 2014 17:05:07 +0000 |
MIME-Version: |
1.0 |
Content-Type: |
text/plain; charset="utf-8" |
Reply-To: |
|
Parts/Attachments: |
|
|
Synopsis: Moderate: rsyslog5 and rsyslog security update
Advisory ID: SLSA-2014:1671-1
Issue Date: 2014-10-20
CVE Numbers: CVE-2014-3634
--
A flaw was found in the way rsyslog handled invalid log message priority
values. In certain configurations, a local attacker, or a remote attacker
able to connect to the rsyslog port, could use this flaw to crash the
rsyslog daemon. (CVE-2014-3634)
After installing the update, the rsyslog service will be restarted
automatically.
--
SL5
x86_64
rsyslog5-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-debuginfo-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-gnutls-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-gssapi-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-mysql-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-pgsql-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-snmp-5.8.12-5.el5_11.x86_64.rpm
i386
rsyslog5-5.8.12-5.el5_11.i386.rpm
rsyslog5-debuginfo-5.8.12-5.el5_11.i386.rpm
rsyslog5-gnutls-5.8.12-5.el5_11.i386.rpm
rsyslog5-gssapi-5.8.12-5.el5_11.i386.rpm
rsyslog5-mysql-5.8.12-5.el5_11.i386.rpm
rsyslog5-pgsql-5.8.12-5.el5_11.i386.rpm
rsyslog5-snmp-5.8.12-5.el5_11.i386.rpm
SL6
x86_64
rsyslog-5.8.10-9.el6_6.x86_64.rpm
rsyslog-debuginfo-5.8.10-9.el6_6.x86_64.rpm
rsyslog-gnutls-5.8.10-9.el6_6.x86_64.rpm
rsyslog-gssapi-5.8.10-9.el6_6.x86_64.rpm
rsyslog-relp-5.8.10-9.el6_6.x86_64.rpm
rsyslog-mysql-5.8.10-9.el6_6.x86_64.rpm
rsyslog-pgsql-5.8.10-9.el6_6.x86_64.rpm
rsyslog-snmp-5.8.10-9.el6_6.x86_64.rpm
i386
rsyslog-5.8.10-9.el6_6.i686.rpm
rsyslog-debuginfo-5.8.10-9.el6_6.i686.rpm
rsyslog-gnutls-5.8.10-9.el6_6.i686.rpm
rsyslog-gssapi-5.8.10-9.el6_6.i686.rpm
rsyslog-relp-5.8.10-9.el6_6.i686.rpm
rsyslog-mysql-5.8.10-9.el6_6.i686.rpm
rsyslog-pgsql-5.8.10-9.el6_6.i686.rpm
rsyslog-snmp-5.8.10-9.el6_6.i686.rpm
- Scientific Linux Development Team
|
|
|