DSA-5150-1 rsyslog -- security update

Related Vulnerabilities: CVE-2022-24903  

Peter Agten discovered that several modules for TCP syslog reception in rsyslog, a system and kernel logging daemon, have buffer overflow flaws when octet-counted framing is used, which could result in denial of service or potentially the execution of arbitrary code. For the oldstable distribution (buster), this problem has been fixed in version 8.1901.0-1+deb10u2. For the stable distribution (bullseye), this problem has been fixed in version 8.2102.0-2+deb11u1. We recommend that you upgrade your rsyslog packages. For the detailed security status of rsyslog please refer to its security tracker page at: https://security-tracker.debian.org/tracker/rsyslog

Debian Security Advisory

DSA-5150-1 rsyslog -- security update

Date Reported:
28 May 2022
Affected Packages:
rsyslog
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1010619.
In Mitre's CVE dictionary: CVE-2022-24903.
More information:

Peter Agten discovered that several modules for TCP syslog reception in rsyslog, a system and kernel logging daemon, have buffer overflow flaws when octet-counted framing is used, which could result in denial of service or potentially the execution of arbitrary code.

For the oldstable distribution (buster), this problem has been fixed in version 8.1901.0-1+deb10u2.

For the stable distribution (bullseye), this problem has been fixed in version 8.2102.0-2+deb11u1.

We recommend that you upgrade your rsyslog packages.

For the detailed security status of rsyslog please refer to its security tracker page at: https://security-tracker.debian.org/tracker/rsyslog