{"id":"MGASA-2014-0411","summary":"Updated rsyslog packages fix CVE-2014-3634","details":"Updated rsyslog packages fix security vulnerability:\n\nRainer Gerhards, the rsyslog project leader, reported a vulnerability in\nRsyslog. As a consequence of this vulnerability an attacker can send\nmalformed messages to a server, if this one accepts data from untrusted\nsources, and trigger a denial of service attack (CVE-2014-3634).\n","modified":"2026-04-16T06:23:35.194080821Z","published":"2014-10-09T14:39:32Z","upstream":["CVE-2014-3634"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0411.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=14206"},{"type":"WEB","url":"http://www.rsyslog.com/remote-syslog-pri-vulnerability/"},{"type":"WEB","url":"http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/"},{"type":"WEB","url":"https://www.debian.org/security/2014/dsa-3040"}],"affected":[{"package":{"name":"rsyslog","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/rsyslog?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.1-2.2.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0411.json"}},{"package":{"name":"rsyslog","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/rsyslog?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.1-3.2.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0411.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}