Bug#644611: Re : Bug#644611: CVE-2011-3200: Stack-based buffer overflow in the parseLegacySyslogMsg function

2011-10-10 Thread emeric boit
> > As said, I agreed with Nico that this issue is not grave enough to be handled > via a security upload, but will be done via a regular stable release update. > Uploads for the next stable release are no longer accepted, so it will have to > go into the next one. > > I also don't think severit

Bug#644611: CVE-2011-3200: Stack-based buffer overflow in the parseLegacySyslogMsg function

2011-10-09 Thread emeric boit
> De: Michael Biebl > Objet: Re: Bug#644611: CVE-2011-3200: Stack-based buffer overflow in the > parseLegacySyslogMsg function > À: "emeric boit" , 644...@bugs.debian.org > Date: Vendredi 7 octobre 2011, 18h44 > Am 07.10.2011 12:55, schrieb emeric > boit: > >

Bug#644611: CVE-2011-3200: Stack-based buffer overflow in the parseLegacySyslogMsg function

2011-10-07 Thread emeric boit
Package: rsyslog Version: 4.6.4-2 Severity: grave Tags: security CVE description: Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (appli