Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1654

Опубликовано: 21 окт. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2014-1654: rsyslog7 security update (IMPORTANT)

[7.4.10-3]

  • fix CVE-2014-3634 resolves: #1149150

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

rsyslog7

7.4.10-3.el6_6

rsyslog7-elasticsearch

7.4.10-3.el6_6

rsyslog7-gnutls

7.4.10-3.el6_6

rsyslog7-gssapi

7.4.10-3.el6_6

rsyslog7-mysql

7.4.10-3.el6_6

rsyslog7-pgsql

7.4.10-3.el6_6

rsyslog7-relp

7.4.10-3.el6_6

rsyslog7-snmp

7.4.10-3.el6_6

Oracle Linux i686

rsyslog7

7.4.10-3.el6_6

rsyslog7-elasticsearch

7.4.10-3.el6_6

rsyslog7-gnutls

7.4.10-3.el6_6

rsyslog7-gssapi

7.4.10-3.el6_6

rsyslog7-mysql

7.4.10-3.el6_6

rsyslog7-pgsql

7.4.10-3.el6_6

rsyslog7-relp

7.4.10-3.el6_6

rsyslog7-snmp

7.4.10-3.el6_6

Связанные CVE

Связанные уязвимости

ubuntu
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

redhat
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

nvd
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

debian
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier ...

github
больше 3 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.