diff options
author | brd <brd@FreeBSD.org> | 2014-10-01 04:09:32 +0800 |
---|---|---|
committer | brd <brd@FreeBSD.org> | 2014-10-01 04:09:32 +0800 |
commit | 8792cbff25bd8ff498b57be4060e53ead276579a (patch) | |
tree | 2f736efadbac7087c738d8e4ba309f2394c1fd62 /security | |
parent | e9b61fa08d2030b7aa6934725fe26684ae29176d (diff) | |
download | freebsd-ports-graphics-8792cbff25bd8ff498b57be4060e53ead276579a.tar.gz freebsd-ports-graphics-8792cbff25bd8ff498b57be4060e53ead276579a.tar.zst freebsd-ports-graphics-8792cbff25bd8ff498b57be4060e53ead276579a.zip |
- Document sysutils/rsyslog vulnerabilities CVE-2014-3634
Reviewed by: bdrewery@
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b966a0e3295..77fda1c5b8b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -57,6 +57,36 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8e0e86ff-48b5-11e4-ab80-000c29f6ae42"> + <topic>rsyslog -- remote syslog PRI vulnerability</topic> + <affects> + <package> + <name>rsyslog</name> + <range><lt>7.6.6</lt></range> + <range><lt>8.4.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The rsyslog project reports:</p> + <blockquote cite="http://www.rsyslog.com/remote-syslog-pri-vulnerability/"> + <p>potential abort when a message with PRI > 191 was processed + if the "pri-text" property was used in active templates, + this could be abused to a remote denial of service from + permitted senders</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.rsyslog.com/remote-syslog-pri-vulnerability/</url> + <cvename>CVE-2014-3634</cvename> + </references> + <dates> + <discovery>2014-09-30</discovery> + <entry>2014-09-30</entry> + </dates> + </vuln> + <vuln vid="6c083cf8-4830-11e4-ae2c-c80aa9043978"> <topic>fish -- local privilege escalation and remote code execution</topic> <affects> |