- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0228 - Bug Fix Advisory
Synopsis
rsyslog bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated rsyslog packages that fix several bugs and add one enhancement are now
available for Red Hat Enterprise Linux 5.
Description
The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It
supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any
message part, and fine grain output format control.
This update fixes the following bugs:
- Previously, rklogd, the daemon that provides kernel logging, was replaced with
a loadable module. However, the functionality was disabled in the configuration.
Consequently, rsyslog did not log any kernel messages. With this update, the
/etc/rsyslog.conf configuration file has been corrected to include the "$ModLoad
imklog" directive and the kernel messages are now logged as expected.
(BZ#592039, BZ#582288)
- The previous version of rsyslog introduced a patch, which fixed unexpected
termination that occurred when a large number of clients was sending their logs
to rsyslog. However, the patch was not applied due to the outdated Autoconf
package in the build environment. With this update, the package is no longer
needed during the build process and the patch is applied successfully.
(BZ#674450)
- The previous rsyslog release introduced a new format of the message time
stamps. However, some utilities, such as logwatch, were unable to parse such
message time stamps properly. This update adds the "$ActionFileDefaultTemplate
RSYSLOG_TraditionalFileFormat" directive to the /etc/rsyslog.conf configuration
file so that the old format is used by default and the respective utilities now
work correctly. (BZ#583621)
- Previously, some rsyslog modules were stored in the /usr/lib{,64} directory
tree. Consequently, rsyslog could fail to start if the /usr/ directory resided
on a different file system and the file system was unavailable during the daemon
startup. With this update, the module directory has been relocated to the
/lib{,64}/ directory and the modules are always accessible to rsyslog.
(BZ#546645)
- The omsnmp module was missing in the rsyslog package. Consequently, sending of
messages with Simple Network Management Protocol (SNMP) could not be used. This
update adds the omsnmp module to the package and the SNMP messages mechanism
works as expected. (BZ#601711)
- Wrong data types were used to hold some configuration values, which caused
rsyslog to ignore the values. This update changes the data types and the
configuration is now processed as expected. (BZ#746179)
- The retry limit was not checked correctly and suspended actions could fail to
resume. This update fixes the underlying code and suspended actions resume as
expected. (BZ#726525)
- The rsyslog utility failed to close the stdout and stderr streams properly
when running in background mode. This caused the operating system to become
unresponsive on system boot. The output streams are now closed properly, which
fixes this bug. (BZ#654379)
- The rsyslog process could consume excessive memory when using message
forwarding with Transport Layer Security (TLS) encryption. With this update, the
underlying code has been modified and the bug is fixed. (BZ#637959)
- The build script wrongly detected the MySQL support when building 32-bit
packages in a 64-bit multilib environment. Consequently, the building process
failed. With this update, the build script now uses the proper mysql_config
binary and the package is built successfully in this scenario. (BZ#694413)
- The lock file created by the rsyslog init script did not match the init script
name. Consequently, the system did not run the stop action to stop the process
on system shut down. With this update, the file is named correctly and the
daemon shuts down as expected. (BZ#650509)
In addition, this update adds the following enhancement:
- This update improves the package description in the 'Description' section.
(BZ#574620)
All rsyslog users are advised to upgrade to these updated packages, which fix
these bugs and adds this enhancement.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 546645 - rsyslogd has its modules in the /usr
- BZ - 574620 - Update %description for rsyslog
- BZ - 582288 - rsyslog does not capture kernel thread dumps
- BZ - 583621 - rsyslog 3.x has no longer old syslog timestamp by default
- BZ - 592039 - Rklogd is gone and kernel log messages are not being logged by rsyslog
- BZ - 637959 - Rsyslog with TLS enabled TCP logging eats CPU and memory
- BZ - 650509 - rsyslog creates invalid subsys lock file
- BZ - 654379 - service rsyslog start | cat hangs
- BZ - 674450 - rsyslog contains ineffectual unlimited select patch
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
rsyslog-3.22.1-7.el5.src.rpm | SHA-256: c457cf00cff2b132c2e56415182cc34ee2c91fbb9aa69356749900f05cff1192 |
x86_64 | |
rsyslog-3.22.1-7.el5.x86_64.rpm | SHA-256: bb7bb2b79c513b53f3967849642fa0305b9e0819e0e481b1fb10f12fa3bd26f0 |
rsyslog-gnutls-3.22.1-7.el5.x86_64.rpm | SHA-256: fd0ea4070705081653c2ce0655269a40a63801d59b99341a6be7f6f0a2858d89 |
rsyslog-gssapi-3.22.1-7.el5.x86_64.rpm | SHA-256: f843053179398038e779ade40576eb4e27b589df38d2a0e57eb08a2cc1b52294 |
rsyslog-mysql-3.22.1-7.el5.x86_64.rpm | SHA-256: 5b039906127e2aa7755ed0d06e68bdeb865ab46cbdfb284b3b8623d43177d778 |
rsyslog-pgsql-3.22.1-7.el5.x86_64.rpm | SHA-256: 470ccf5112103618bfb73a6430304f53d7dc8fb185041684804d7c2bb34e35d7 |
rsyslog-snmp-3.22.1-7.el5.x86_64.rpm | SHA-256: 1063cbe8aab1f922572ad42f499a0bf8a37865da2bcb1f62da83b7da5ac7e27e |
ia64 | |
rsyslog-3.22.1-7.el5.ia64.rpm | SHA-256: dd913ff5442ee304210cb67912ed0a0133a250cf6c68c4ddb8b0b3ab93684ba8 |
rsyslog-gnutls-3.22.1-7.el5.ia64.rpm | SHA-256: 63a1877cdb82ae474b82553380e227b0d710c13f4a391bced6252c1f0e93c4c9 |
rsyslog-gssapi-3.22.1-7.el5.ia64.rpm | SHA-256: 597ea0efa10f082f63f2e07dcab78599da1cee083c6d66fcb0f21d0c8e394a0a |
rsyslog-mysql-3.22.1-7.el5.ia64.rpm | SHA-256: 9492af6f4cf36a8e2597b04f85e8ff179b92eeda10be0bc283df91f5d3ec78cf |
rsyslog-pgsql-3.22.1-7.el5.ia64.rpm | SHA-256: 2d9e603ae70d8896c728b7c3e610091cc7209300c18de7bdad3e4e522de1a8f7 |
rsyslog-snmp-3.22.1-7.el5.ia64.rpm | SHA-256: bb914f9ebbe1717fa35d6983e9562f5b7b2eb9603a49bc3ab8d65c50560a8195 |
i386 | |
rsyslog-3.22.1-7.el5.i386.rpm | SHA-256: 2903165fee8e76b5dae37157e95843fd5d372e779d545d7a5a5ba97ce3c5da95 |
rsyslog-gnutls-3.22.1-7.el5.i386.rpm | SHA-256: 37b8e809205cd8d3ae27d8aabc37bf3389ee8523c67aab43a3f8ea474f0de033 |
rsyslog-gssapi-3.22.1-7.el5.i386.rpm | SHA-256: 36ed042b77671c1c28757d0fa1bebb48c153b4256133d76c6d107ed773f847ae |
rsyslog-mysql-3.22.1-7.el5.i386.rpm | SHA-256: 708fa2b3fd6a40fe4b2e8c817cb61e2f105817297bd39099d790660040a4980e |
rsyslog-pgsql-3.22.1-7.el5.i386.rpm | SHA-256: d4ddb2cd5ad83d26a124d4531d1c0084d8f5e537fc9d8d7835086594e03301ef |
rsyslog-snmp-3.22.1-7.el5.i386.rpm | SHA-256: 95d448ea183af2246462c3d36dcfbaa9318a09dc055c0dfaa64d20416b31094c |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
rsyslog-3.22.1-7.el5.src.rpm | SHA-256: c457cf00cff2b132c2e56415182cc34ee2c91fbb9aa69356749900f05cff1192 |
x86_64 | |
rsyslog-3.22.1-7.el5.x86_64.rpm | SHA-256: bb7bb2b79c513b53f3967849642fa0305b9e0819e0e481b1fb10f12fa3bd26f0 |
rsyslog-gnutls-3.22.1-7.el5.x86_64.rpm | SHA-256: fd0ea4070705081653c2ce0655269a40a63801d59b99341a6be7f6f0a2858d89 |
rsyslog-gssapi-3.22.1-7.el5.x86_64.rpm | SHA-256: f843053179398038e779ade40576eb4e27b589df38d2a0e57eb08a2cc1b52294 |
rsyslog-mysql-3.22.1-7.el5.x86_64.rpm | SHA-256: 5b039906127e2aa7755ed0d06e68bdeb865ab46cbdfb284b3b8623d43177d778 |
rsyslog-pgsql-3.22.1-7.el5.x86_64.rpm | SHA-256: 470ccf5112103618bfb73a6430304f53d7dc8fb185041684804d7c2bb34e35d7 |
rsyslog-snmp-3.22.1-7.el5.x86_64.rpm | SHA-256: 1063cbe8aab1f922572ad42f499a0bf8a37865da2bcb1f62da83b7da5ac7e27e |
i386 | |
rsyslog-3.22.1-7.el5.i386.rpm | SHA-256: 2903165fee8e76b5dae37157e95843fd5d372e779d545d7a5a5ba97ce3c5da95 |
rsyslog-gnutls-3.22.1-7.el5.i386.rpm | SHA-256: 37b8e809205cd8d3ae27d8aabc37bf3389ee8523c67aab43a3f8ea474f0de033 |
rsyslog-gssapi-3.22.1-7.el5.i386.rpm | SHA-256: 36ed042b77671c1c28757d0fa1bebb48c153b4256133d76c6d107ed773f847ae |
rsyslog-mysql-3.22.1-7.el5.i386.rpm | SHA-256: 708fa2b3fd6a40fe4b2e8c817cb61e2f105817297bd39099d790660040a4980e |
rsyslog-pgsql-3.22.1-7.el5.i386.rpm | SHA-256: d4ddb2cd5ad83d26a124d4531d1c0084d8f5e537fc9d8d7835086594e03301ef |
rsyslog-snmp-3.22.1-7.el5.i386.rpm | SHA-256: 95d448ea183af2246462c3d36dcfbaa9318a09dc055c0dfaa64d20416b31094c |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
rsyslog-3.22.1-7.el5.src.rpm | SHA-256: c457cf00cff2b132c2e56415182cc34ee2c91fbb9aa69356749900f05cff1192 |
x86_64 | |
rsyslog-3.22.1-7.el5.x86_64.rpm | SHA-256: bb7bb2b79c513b53f3967849642fa0305b9e0819e0e481b1fb10f12fa3bd26f0 |
rsyslog-gnutls-3.22.1-7.el5.x86_64.rpm | SHA-256: fd0ea4070705081653c2ce0655269a40a63801d59b99341a6be7f6f0a2858d89 |
rsyslog-gssapi-3.22.1-7.el5.x86_64.rpm | SHA-256: f843053179398038e779ade40576eb4e27b589df38d2a0e57eb08a2cc1b52294 |
rsyslog-mysql-3.22.1-7.el5.x86_64.rpm | SHA-256: 5b039906127e2aa7755ed0d06e68bdeb865ab46cbdfb284b3b8623d43177d778 |
rsyslog-pgsql-3.22.1-7.el5.x86_64.rpm | SHA-256: 470ccf5112103618bfb73a6430304f53d7dc8fb185041684804d7c2bb34e35d7 |
rsyslog-snmp-3.22.1-7.el5.x86_64.rpm | SHA-256: 1063cbe8aab1f922572ad42f499a0bf8a37865da2bcb1f62da83b7da5ac7e27e |
i386 | |
rsyslog-3.22.1-7.el5.i386.rpm | SHA-256: 2903165fee8e76b5dae37157e95843fd5d372e779d545d7a5a5ba97ce3c5da95 |
rsyslog-gnutls-3.22.1-7.el5.i386.rpm | SHA-256: 37b8e809205cd8d3ae27d8aabc37bf3389ee8523c67aab43a3f8ea474f0de033 |
rsyslog-gssapi-3.22.1-7.el5.i386.rpm | SHA-256: 36ed042b77671c1c28757d0fa1bebb48c153b4256133d76c6d107ed773f847ae |
rsyslog-mysql-3.22.1-7.el5.i386.rpm | SHA-256: 708fa2b3fd6a40fe4b2e8c817cb61e2f105817297bd39099d790660040a4980e |
rsyslog-pgsql-3.22.1-7.el5.i386.rpm | SHA-256: d4ddb2cd5ad83d26a124d4531d1c0084d8f5e537fc9d8d7835086594e03301ef |
rsyslog-snmp-3.22.1-7.el5.i386.rpm | SHA-256: 95d448ea183af2246462c3d36dcfbaa9318a09dc055c0dfaa64d20416b31094c |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
rsyslog-3.22.1-7.el5.src.rpm | SHA-256: c457cf00cff2b132c2e56415182cc34ee2c91fbb9aa69356749900f05cff1192 |
s390x | |
rsyslog-3.22.1-7.el5.s390x.rpm | SHA-256: ab1e2717f84428f51a8b279fed434f0d06e5dc33ccba7c90c27e02cc17ab6256 |
rsyslog-gnutls-3.22.1-7.el5.s390x.rpm | SHA-256: 531abee288c7b999535a05224d3fe51cbcfe5bc86b812a7f6d757275d53f6e62 |
rsyslog-gssapi-3.22.1-7.el5.s390x.rpm | SHA-256: 3823c648bc352e99d5f16f0da02861a5c728a2d8d107e160008fd37532ead980 |
rsyslog-mysql-3.22.1-7.el5.s390x.rpm | SHA-256: 8845b9ae646b65e348d564ba4e0eb6415a62c7a02d02cf141f8bdee7055fff84 |
rsyslog-pgsql-3.22.1-7.el5.s390x.rpm | SHA-256: 03a7aa2e57435ec93cb6ef710d3c03b0a2eddb695f03ab9966ac163e96bae971 |
rsyslog-snmp-3.22.1-7.el5.s390x.rpm | SHA-256: 432841b56659fb7814eae630cfd7dc6eca6b0ac157cb2d1f8b0ae963885e2edd |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
rsyslog-3.22.1-7.el5.src.rpm | SHA-256: c457cf00cff2b132c2e56415182cc34ee2c91fbb9aa69356749900f05cff1192 |
ppc | |
rsyslog-3.22.1-7.el5.ppc.rpm | SHA-256: 40e6ed23f6f8dfd05551eeeb4cff1261c34364a5d0dbbcf02151d4f7763165f5 |
rsyslog-gnutls-3.22.1-7.el5.ppc.rpm | SHA-256: 9076ca0d290b3ccab1a3c2dacd1bc7144a8f5407a8b1a9d5be21b832cac65b75 |
rsyslog-gssapi-3.22.1-7.el5.ppc.rpm | SHA-256: 6f83c218f0e726f3551935f8abe31c1c06a36c17860d52c8ad9506844fabd115 |
rsyslog-mysql-3.22.1-7.el5.ppc.rpm | SHA-256: 2f278c274d6a5a06f6d51cb20ab7fc9ec628dd048f1d3c62e061f6dffa9e3e4f |
rsyslog-pgsql-3.22.1-7.el5.ppc.rpm | SHA-256: e5dbb53d72e8a389dbc29f21d0add814a6b35131953f7b62e4fb4ada8dc2c8ee |
rsyslog-snmp-3.22.1-7.el5.ppc.rpm | SHA-256: ed5a78a6cb0633752a9fd628ecfaed418267c87c02a3eab60aec4a177fb97f11 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
rsyslog-3.22.1-7.el5.src.rpm | SHA-256: c457cf00cff2b132c2e56415182cc34ee2c91fbb9aa69356749900f05cff1192 |
x86_64 | |
rsyslog-3.22.1-7.el5.x86_64.rpm | SHA-256: bb7bb2b79c513b53f3967849642fa0305b9e0819e0e481b1fb10f12fa3bd26f0 |
rsyslog-gnutls-3.22.1-7.el5.x86_64.rpm | SHA-256: fd0ea4070705081653c2ce0655269a40a63801d59b99341a6be7f6f0a2858d89 |
rsyslog-gssapi-3.22.1-7.el5.x86_64.rpm | SHA-256: f843053179398038e779ade40576eb4e27b589df38d2a0e57eb08a2cc1b52294 |
rsyslog-mysql-3.22.1-7.el5.x86_64.rpm | SHA-256: 5b039906127e2aa7755ed0d06e68bdeb865ab46cbdfb284b3b8623d43177d778 |
rsyslog-pgsql-3.22.1-7.el5.x86_64.rpm | SHA-256: 470ccf5112103618bfb73a6430304f53d7dc8fb185041684804d7c2bb34e35d7 |
rsyslog-snmp-3.22.1-7.el5.x86_64.rpm | SHA-256: 1063cbe8aab1f922572ad42f499a0bf8a37865da2bcb1f62da83b7da5ac7e27e |
i386 | |
rsyslog-3.22.1-7.el5.i386.rpm | SHA-256: 2903165fee8e76b5dae37157e95843fd5d372e779d545d7a5a5ba97ce3c5da95 |
rsyslog-gnutls-3.22.1-7.el5.i386.rpm | SHA-256: 37b8e809205cd8d3ae27d8aabc37bf3389ee8523c67aab43a3f8ea474f0de033 |
rsyslog-gssapi-3.22.1-7.el5.i386.rpm | SHA-256: 36ed042b77671c1c28757d0fa1bebb48c153b4256133d76c6d107ed773f847ae |
rsyslog-mysql-3.22.1-7.el5.i386.rpm | SHA-256: 708fa2b3fd6a40fe4b2e8c817cb61e2f105817297bd39099d790660040a4980e |
rsyslog-pgsql-3.22.1-7.el5.i386.rpm | SHA-256: d4ddb2cd5ad83d26a124d4531d1c0084d8f5e537fc9d8d7835086594e03301ef |
rsyslog-snmp-3.22.1-7.el5.i386.rpm | SHA-256: 95d448ea183af2246462c3d36dcfbaa9318a09dc055c0dfaa64d20416b31094c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.