-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3040-1 security@debian.org http://www.debian.org/security/ September 30, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : rsyslog CVE ID : CVE-2014-3634 Rainer Gerhards, the rsyslog project leader, reported a vulnerability in Rsyslog, a system for log processing. As a consequence of this vulnerability an attacker can send malformed messages to a server, if this one accepts data from untrusted sources, and trigger a denial of service attack. For the stable distribution (wheezy), this problem has been fixed in version 5.8.11-3+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 8.4.1-1. We recommend that you upgrade your rsyslog packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org