MiracleLinux 4 : rsyslog-5.8.10-2.AXS4 (AXSA:2012-586:02)

medium Nessus Plugin ID 284312

Synopsis

The remote MiracleLinux host is missing a security update.

Description

The remote MiracleLinux 4 host has packages installed that are affected by a vulnerability as referenced in the AXSA:2012-586:02 advisory.

Rsyslog is an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine grain output format control. It is compatible with stock sysklogd and can be used as a drop-in replacement. Rsyslog is simple to set up, with advanced features suitable for enterprise-class, encryption-protected syslog relay chains.
Security issues fixed with this release:
CVE-2011-4623 No description available at the time of writing, please use the CVE link below.
Bug fixes:
With Transport Layer Security (TLS) transport and keys in PKCS#8 format, some variables were not deinitialized correctly because rsyslogd crashed with a segmentation fault. This has been fixed.
When set up to provide a GSSAPI listener, rsyslogd crashed with a segmentation fault and the imgssapi plug-in initialization was not complete. This has been fixed.
Fixed alias handling to not necessarily use the FQDN as the alias for the localhost hostname of on multihomed hosts.
The gtls module is not unloaded anymore during the process lifetime; this fixes the system reaching the limit for file descriptors.
rsyslog can now override the hostname to set an alternative hostname for locally generated messages.
rsyslogd init script now passes the lock file path to the 'status' action: the lock file is not ignored anymore, and the correct exit code is returned.
Malformed spool files could incorrectly deinitialize data, in turn making rsyslogd crash with a segmentation fault. This has been fixed.
rsyslog now gracefully handles the errors responsible for deinitialization of non-existent data when rsyslog is set up to use a disk assisted queue when specifying a spool file.
Fixed the descritpion of the -d option in the man page.
Debug messages are no longer written to standard output when run in the background.
DNs with more than 128 characters were not displayed. This update enlarges the string buffer to process long DNs.
Enhancements:
rsyslogd can now limit the number of messages it accepts through a UNIX socket.
Added the /etc/rsyslog.d/ configuration directory to supply syslog configuration files.
Note: After installing this update, the rsyslog daemon will be restarted automatically.

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://tsn.miraclelinux.com/en/node/3101

Plugin Details

Severity: Medium

ID: 284312

File Name: miracle_linux_AXSA-2012-586.nasl

Version: 1.1

Type: local

Published: 1/14/2026

Updated: 1/14/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2011-4623

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:miracle:linux:4, p-cpe:/a:miracle:linux:rsyslog-mysql, p-cpe:/a:miracle:linux:rsyslog-relp, p-cpe:/a:miracle:linux:rsyslog-pgsql, p-cpe:/a:miracle:linux:rsyslog, p-cpe:/a:miracle:linux:rsyslog-gssapi, p-cpe:/a:miracle:linux:rsyslog-gnutls

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/24/2012

Vulnerability Publication Date: 12/22/2011

Reference Information

CVE: CVE-2011-4623