Lucene search

K
redhatRedHatRHSA-2014:1671
HistoryOct 20, 2014 - 12:00 a.m.

(RHSA-2014:1671) Moderate: rsyslog5 and rsyslog security update

2014-10-2000:00:00
access.redhat.com
40

0.228 Low

EPSS

Percentile

96.5%

The rsyslog packages provide an enhanced, multi-threaded syslog daemon
that supports writing to relational databases, syslog/TCP, RFC 3195,
permitted sender lists, filtering on any message part, and fine grained
output format control.

A flaw was found in the way rsyslog handled invalid log message priority
values. In certain configurations, a local attacker, or a remote attacker
able to connect to the rsyslog port, could use this flaw to crash the
rsyslog daemon. (CVE-2014-3634)

Red Hat would like to thank Rainer Gerhards of rsyslog upstream for
reporting this issue.

All rsyslog5 and rsyslog users are advised to upgrade to these updated
packages, which contain a backported patch to correct this issue. After
installing the update, the rsyslog service will be restarted automatically.