>
> As said, I agreed with Nico that this issue is not grave enough to be handled
> via a security upload, but will be done via a regular stable release update.
> Uploads for the next stable release are no longer accepted, so it will have to
> go into the next one.
>
> I also don't think severit
severity 644611 important
thanks
Am 09.10.2011 13:57, schrieb emeric boit:
>> De: Michael Biebl
>> Objet: Re: Bug#644611: CVE-2011-3200: Stack-based buffer overflow in the
>> parseLegacySyslogMsg function
>> À: "emeric boit" , 644...@bugs.debian.org
>> Da
> De: Michael Biebl
> Objet: Re: Bug#644611: CVE-2011-3200: Stack-based buffer overflow in the
> parseLegacySyslogMsg function
> À: "emeric boit" , 644...@bugs.debian.org
> Date: Vendredi 7 octobre 2011, 18h44
> Am 07.10.2011 12:55, schrieb emeric
> boit:
> >
Am 07.10.2011 12:55, schrieb emeric boit:
> Package: rsyslog
> Version: 4.6.4-2
> Severity: grave
> Tags: security
>
> CVE description:
> Stack-based buffer overflow in the parseLegacySyslogMsg function in
> tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0
> through 5.8.4 migh
Package: rsyslog
Version: 4.6.4-2
Severity: grave
Tags: security
CVE description:
Stack-based buffer overflow in the parseLegacySyslogMsg function in
tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0
through 5.8.4 might allow remote attackers to cause a denial of service
(appli
5 matches
Mail list logo