Important CentOS rsyslog7 Security Update

Metadata

high
7.5
rsyslog7-7.4.10-3.el6_6.i686.rpm, rsyslog7-7.4.10-3.el6_6.src.rpm, rsyslog7-7.4.10-3.el6_6.x86_64.rpm, rsyslog7-elasticsearch-7.4.10-3.el6_6.i686.rpm, rsyslog7-elasticsearch-7.4.10-3.el6_6.x86_64.rpm, rsyslog7-gnutls-7.4.10-3.el6_6.i686.rpm, rsyslog7-gnutls-7.4.10-3.el6_6.x86_64.rpm, rsyslog7-gssapi-7.4.10-3.el6_6.i686.rpm, rsyslog7-gssapi-7.4.10-3.el6_6.x86_64.rpm, rsyslog7-mysql-7.4.10-3.el6_6.i686.rpm, rsyslog7-mysql-7.4.10-3.el6_6.x86_64.rpm, rsyslog7-pgsql-7.4.10-3.el6_6.i686.rpm, rsyslog7-pgsql-7.4.10-3.el6_6.x86_64.rpm, rsyslog7-relp-7.4.10-3.el6_6.i686.rpm, rsyslog7-relp-7.4.10-3.el6_6.x86_64.rpm, rsyslog7-snmp-7.4.10-3.el6_6.i686.rpm, rsyslog7-snmp-7.4.10-3.el6_6.x86_64.rpm
CVE-2014-3634
rhn.redhat.com, lists.centos.org
2014-10-20
2017-07-27 19:07
ALAS-2014-445
Moderate CentOS rsyslog5 Security Update
Important CentOS rsyslog Security Update
CVE-2014-3634 inetutils
CVE-2014-3634 rsyslog
CVE-2014-3634
2017-04-01 19:08
2017-01-05 20:12

Description


Updated rsyslog7 packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

The rsyslog7 packages provide an enhanced, multi-threaded syslog daemon
that supports writing to relational databases, syslog/TCP, RFC 3195,
permitted sender lists, filtering on any message part, and fine grained
output format control.

A flaw was found in the way rsyslog handled invalid log message priority
values. In certain configurations, a local attacker, or a remote attacker
able to connect to the rsyslog port, could use this flaw to crash the
rsyslog daemon or, potentially, execute arbitrary code as the user running
the rsyslog daemon. (CVE-2014-3634)

Red Hat would like to thank Rainer Gerhards of rsyslog upstream for
reporting this issue.

All rsyslog7 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the rsyslog service will be restarted automatically.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 rsyslog7 rsyslog7-7.4.10-3.el6_6.i686.rpm
rsyslog7 rsyslog7-7.4.10-3.el6_6.src.rpm
rsyslog7 rsyslog7-7.4.10-3.el6_6.x86_64.rpm
rsyslog7-elasticsearch rsyslog7-elasticsearch-7.4.10-3.el6_6.i686.rpm
rsyslog7-elasticsearch rsyslog7-elasticsearch-7.4.10-3.el6_6.x86_64.rpm
rsyslog7-gnutls rsyslog7-gnutls-7.4.10-3.el6_6.i686.rpm
rsyslog7-gnutls rsyslog7-gnutls-7.4.10-3.el6_6.x86_64.rpm
rsyslog7-gssapi rsyslog7-gssapi-7.4.10-3.el6_6.i686.rpm
rsyslog7-gssapi rsyslog7-gssapi-7.4.10-3.el6_6.x86_64.rpm
rsyslog7-mysql rsyslog7-mysql-7.4.10-3.el6_6.i686.rpm
rsyslog7-mysql rsyslog7-mysql-7.4.10-3.el6_6.x86_64.rpm
rsyslog7-pgsql rsyslog7-pgsql-7.4.10-3.el6_6.i686.rpm
rsyslog7-pgsql rsyslog7-pgsql-7.4.10-3.el6_6.x86_64.rpm
rsyslog7-relp rsyslog7-relp-7.4.10-3.el6_6.i686.rpm
rsyslog7-relp rsyslog7-relp-7.4.10-3.el6_6.x86_64.rpm
rsyslog7-snmp rsyslog7-snmp-7.4.10-3.el6_6.i686.rpm
rsyslog7-snmp rsyslog7-snmp-7.4.10-3.el6_6.x86_64.rpm