Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1671

Опубликовано: 20 окт. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 5

Описание

ELSA-2014-1671: rsyslog5 and rsyslog security update (MODERATE)

[5.8.12-5.0.1]

  • use setsid() to get a controlling session and process group [Orabug: 17364545]

[5.8.12-5]

  • fix CVE-2014-3634 resolves: #1149158

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

rsyslog

5.8.10-9.0.1.el6_6

rsyslog-gnutls

5.8.10-9.0.1.el6_6

rsyslog-gssapi

5.8.10-9.0.1.el6_6

rsyslog-mysql

5.8.10-9.0.1.el6_6

rsyslog-pgsql

5.8.10-9.0.1.el6_6

rsyslog-relp

5.8.10-9.0.1.el6_6

rsyslog-snmp

5.8.10-9.0.1.el6_6

Oracle Linux i686

rsyslog

5.8.10-9.0.1.el6_6

rsyslog-gnutls

5.8.10-9.0.1.el6_6

rsyslog-gssapi

5.8.10-9.0.1.el6_6

rsyslog-mysql

5.8.10-9.0.1.el6_6

rsyslog-pgsql

5.8.10-9.0.1.el6_6

rsyslog-relp

5.8.10-9.0.1.el6_6

rsyslog-snmp

5.8.10-9.0.1.el6_6

Oracle Linux 5

Oracle Linux ia64

rsyslog5

5.8.12-5.0.1.el5_11

rsyslog5-gnutls

5.8.12-5.0.1.el5_11

rsyslog5-gssapi

5.8.12-5.0.1.el5_11

rsyslog5-mysql

5.8.12-5.0.1.el5_11

rsyslog5-pgsql

5.8.12-5.0.1.el5_11

rsyslog5-snmp

5.8.12-5.0.1.el5_11

Oracle Linux x86_64

rsyslog5

5.8.12-5.0.1.el5_11

rsyslog5-gnutls

5.8.12-5.0.1.el5_11

rsyslog5-gssapi

5.8.12-5.0.1.el5_11

rsyslog5-mysql

5.8.12-5.0.1.el5_11

rsyslog5-pgsql

5.8.12-5.0.1.el5_11

rsyslog5-snmp

5.8.12-5.0.1.el5_11

Oracle Linux i386

rsyslog5

5.8.12-5.0.1.el5_11

rsyslog5-gnutls

5.8.12-5.0.1.el5_11

rsyslog5-gssapi

5.8.12-5.0.1.el5_11

rsyslog5-mysql

5.8.12-5.0.1.el5_11

rsyslog5-pgsql

5.8.12-5.0.1.el5_11

rsyslog5-snmp

5.8.12-5.0.1.el5_11

Связанные CVE

Связанные уязвимости

ubuntu
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

redhat
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

nvd
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

debian
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier ...

github
больше 3 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.