[USN-2381-1] Rsyslog vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Thu Oct 9 17:00:29 UTC 2014


==========================================================================
Ubuntu Security Notice USN-2381-1
October 09, 2014

rsyslog vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Rsyslog could be made to crash if it received specially crafted input.

Software Description:
- rsyslog: Enhanced syslogd

Details:

It was discovered that Rsyslog incorrectly handled invalid PRI values. An
attacker could use this issue to send malformed messages to the Rsyslog
server and cause it to stop responding, resulting in a denial of service
and possibly message loss. (CVE-2014-3634, CVE-2014-3683)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
  rsyslog                         7.4.4-1ubuntu2.3

Ubuntu 12.04 LTS:
  rsyslog                         5.8.6-1ubuntu8.9

Ubuntu 10.04 LTS:
  rsyslog                         4.2.0-2ubuntu8.3

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-2381-1
  CVE-2014-3634, CVE-2014-3683

Package Information:
  https://launchpad.net/ubuntu/+source/rsyslog/7.4.4-1ubuntu2.3
  https://launchpad.net/ubuntu/+source/rsyslog/5.8.6-1ubuntu8.9
  https://launchpad.net/ubuntu/+source/rsyslog/4.2.0-2ubuntu8.3


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20141009/58c27c64/attachment.sig>


More information about the ubuntu-security-announce mailing list