First published: Tue May 31 2022(Updated: )
The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format.<br>The rsyslog7 packages provide an enhanced, multi-threaded syslog daemon. It supports on-demand disk buffering, reliable syslog over TCP, SSL, TLS and RELP, writing to databases (MySQL, PostgreSQL, Oracle, and others), email alerting, fully configurable output formats (including high-precision time stamps), the ability to filter on any part of the syslog message, on-the-wire message compression, and the ability to convert text files to syslog.<br>Security Fix(es):<br><li> rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rsyslog | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog7 | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-debuginfo | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-gnutls | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-gssapi | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-mysql | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-pgsql | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-relp | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-snmp | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog7 | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-debuginfo | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-elasticsearch | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-gnutls | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-gssapi | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-mysql | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-pgsql | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-relp | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-snmp | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog-debuginfo | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-gnutls | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-gssapi | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-mysql | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-pgsql | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-relp | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog-snmp | <5.8.10-12.el6_10.1 | 5.8.10-12.el6_10.1 |
redhat/rsyslog7-debuginfo | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-elasticsearch | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-gnutls | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-gssapi | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-mysql | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-pgsql | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-relp | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
redhat/rsyslog7-snmp | <7.4.10-7.el6_10.1 | 7.4.10-7.el6_10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:4808 is classified as important.
To fix RHSA-2022:4808, update the rsyslog or rsyslog7 packages to the recommended versions, either 5.8.10-12.el6_10.1 or 7.4.10-7.el6_10.1.
RHSA-2022:4808 affects Red Hat Enterprise Linux 6 systems running certain versions of rsyslog and rsyslog7.
The packages mentioned in RHSA-2022:4808 include rsyslog and rsyslog7, along with their related sub-packages.
There is no official workaround provided for RHSA-2022:4808; the best action is to apply the recommended updates.