Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2022-24903: rsyslog: potential heap buffer overflow in modules for TCP syslog reception | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Robert Frohl <rfrohl> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Major | ||
Priority: | P2 - High | CC: | abergmann, Andreas.Stieger, meissner |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/330427/ | ||
See Also: | https://bugzilla.suse.com/show_bug.cgi?id=1206201 | ||
Whiteboard: | CVSSv3.1:SUSE:CVE-2022-1550:8.1:(AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSSv3.1:SUSE:CVE-2022-24903:8.1:(AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | ||
Found By: | --- | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Comment 17
Robert Frohl
2022-05-05 12:57:27 UTC
(In reply to Robert Frohl from comment #17) > oss-security: > > [..] > > ### Patches > The patch is available via commit ID [PUT HERE]. https://github.com/rsyslog/rsyslog/commit/89955b0bcb1ff105e1374aad7e0e993faa6a038f for openSUSE Tumbleweed: https://build.opensuse.org/request/show/975635 This is an autogenerated message for OBS integration: This bug (1199061) was mentioned in https://build.opensuse.org/request/show/975639 Factory / rsyslog SUSE-SU-2022:1583-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1199061 CVE References: CVE-2022-24903 JIRA References: Sources used: openSUSE Leap 15.3 (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Manager Server 4.1 (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Manager Retail Branch Server 4.1 (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Manager Proxy 4.1 (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Linux Enterprise Realtime Extension 15-SP2 (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): rsyslog-8.2106.0-150200.4.26.1 SUSE Enterprise Storage 7 (src): rsyslog-8.2106.0-150200.4.26.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. update was released, bug should be good to close. Reassigning to security-team to wrap it up. SUSE-SU-2022:1817-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1199061 CVE References: CVE-2022-24903 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15-SP1 (src): rsyslog-8.33.1-150000.3.37.1 SUSE Linux Enterprise Server for SAP 15 (src): rsyslog-8.33.1-150000.3.37.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): rsyslog-8.33.1-150000.3.37.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): rsyslog-8.33.1-150000.3.37.1 SUSE Linux Enterprise Server 15-LTSS (src): rsyslog-8.33.1-150000.3.37.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): rsyslog-8.33.1-150000.3.37.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): rsyslog-8.33.1-150000.3.37.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): rsyslog-8.33.1-150000.3.37.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): rsyslog-8.33.1-150000.3.37.1 SUSE Enterprise Storage 6 (src): rsyslog-8.33.1-150000.3.37.1 SUSE CaaS Platform 4.0 (src): rsyslog-8.33.1-150000.3.37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2314-1: An update that solves one vulnerability, contains one feature and has 11 fixes is now available. Category: security (important) Bug References: 1051798,1068678,1080238,1082318,1101642,1110456,1160414,1178288,1178490,1182653,1188039,1199061 CVE References: CVE-2022-24903 JIRA References: SLE-23304 Sources used: SUSE Linux Enterprise Server 12-SP5 (src): rsyslog-8.2106.0-8.5.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2331-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1199061 CVE References: CVE-2022-24903 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): rsyslog-8.24.0-3.58.2 SUSE OpenStack Cloud Crowbar 8 (src): rsyslog-8.24.0-3.58.2 SUSE OpenStack Cloud 9 (src): rsyslog-8.24.0-3.58.2 SUSE OpenStack Cloud 8 (src): rsyslog-8.24.0-3.58.2 SUSE Linux Enterprise Server for SAP 12-SP4 (src): rsyslog-8.24.0-3.58.2 SUSE Linux Enterprise Server for SAP 12-SP3 (src): rsyslog-8.24.0-3.58.2 SUSE Linux Enterprise Server 12-SP4-LTSS (src): rsyslog-8.24.0-3.58.2 SUSE Linux Enterprise Server 12-SP3-LTSS (src): rsyslog-8.24.0-3.58.2 SUSE Linux Enterprise Server 12-SP3-BCL (src): rsyslog-8.24.0-3.58.2 HPE Helion Openstack 8 (src): rsyslog-8.24.0-3.58.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2333-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1199061 CVE References: CVE-2022-24903 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP2-BCL (src): rsyslog-8.4.0-18.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. Fixed and released. |