Bug 2082616

Summary: CVE-2022-24903 rsyslog: Heap-based overflow in TCP syslog server [ovirt-4.5]
Product: [oVirt] ovirt-node Reporter: Sandro Bonazzola <sbonazzo>
Component: Included packagesAssignee: Sandro Bonazzola <sbonazzo>
Status: CLOSED CURRENTRELEASE QA Contact: cshao <cshao>
Severity: high Docs Contact:
Priority: high    
Version: arachman, bugs, cshao, lsvaty, lveyde, mavital, peyu, sanja, sbonazzo, weiwang, yaniwang
Target Milestone: ovirt-4.5.1Keywords: Security, SecurityTracking
Target Release: 4.5.1Flags: sbonazzo: ovirt-4.5?
cshao: testing_ack+
Hardware: Unspecified   
OS: Unspecified   
URL: https://koji.mbox.centos.org/koji/packageinfo?packageID=2188
Fixed In Version: rsyslog-8.2102.0-10.el8 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-06-23 06:13:11 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: Node RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 2081401    
Bug Blocks: 2081353    

Description Sandro Bonazzola 2022-05-06 15:02:08 UTC
This bug was created to ensure that one or more security vulnerabilities are fixed in affected versions of oVirt.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

Comment 1 Sandro Bonazzola 2022-05-31 13:11:19 UTC
Build with CVE fix landed in CentOS: https://koji.mbox.centos.org/koji/buildinfo?buildID=21873

Comment 2 Sandro Bonazzola 2022-06-23 06:13:11 UTC
This bugzilla is included in oVirt 4.5.1 release, published on June 22nd 2022.
Since the problem described in this bug report should be resolved in oVirt 4.5.1 release, it has been closed with a resolution of CURRENT RELEASE.
If the solution does not work for you, please open a new bug report.