Subject: | |
From: | |
Reply To: | |
Date: | Wed, 22 Oct 2014 17:05:07 +0000 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: rsyslog5 and rsyslog security update
Advisory ID: SLSA-2014:1671-1
Issue Date: 2014-10-20
CVE Numbers: CVE-2014-3634
--
A flaw was found in the way rsyslog handled invalid log message priority
values. In certain configurations, a local attacker, or a remote attacker
able to connect to the rsyslog port, could use this flaw to crash the
rsyslog daemon. (CVE-2014-3634)
After installing the update, the rsyslog service will be restarted
automatically.
--
SL5
x86_64
rsyslog5-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-debuginfo-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-gnutls-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-gssapi-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-mysql-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-pgsql-5.8.12-5.el5_11.x86_64.rpm
rsyslog5-snmp-5.8.12-5.el5_11.x86_64.rpm
i386
rsyslog5-5.8.12-5.el5_11.i386.rpm
rsyslog5-debuginfo-5.8.12-5.el5_11.i386.rpm
rsyslog5-gnutls-5.8.12-5.el5_11.i386.rpm
rsyslog5-gssapi-5.8.12-5.el5_11.i386.rpm
rsyslog5-mysql-5.8.12-5.el5_11.i386.rpm
rsyslog5-pgsql-5.8.12-5.el5_11.i386.rpm
rsyslog5-snmp-5.8.12-5.el5_11.i386.rpm
SL6
x86_64
rsyslog-5.8.10-9.el6_6.x86_64.rpm
rsyslog-debuginfo-5.8.10-9.el6_6.x86_64.rpm
rsyslog-gnutls-5.8.10-9.el6_6.x86_64.rpm
rsyslog-gssapi-5.8.10-9.el6_6.x86_64.rpm
rsyslog-relp-5.8.10-9.el6_6.x86_64.rpm
rsyslog-mysql-5.8.10-9.el6_6.x86_64.rpm
rsyslog-pgsql-5.8.10-9.el6_6.x86_64.rpm
rsyslog-snmp-5.8.10-9.el6_6.x86_64.rpm
i386
rsyslog-5.8.10-9.el6_6.i686.rpm
rsyslog-debuginfo-5.8.10-9.el6_6.i686.rpm
rsyslog-gnutls-5.8.10-9.el6_6.i686.rpm
rsyslog-gssapi-5.8.10-9.el6_6.i686.rpm
rsyslog-relp-5.8.10-9.el6_6.i686.rpm
rsyslog-mysql-5.8.10-9.el6_6.i686.rpm
rsyslog-pgsql-5.8.10-9.el6_6.i686.rpm
rsyslog-snmp-5.8.10-9.el6_6.i686.rpm
- Scientific Linux Development Team
|
|
|