Modules for TCP syslog reception have a heap buffer overflow when octet-counted framing is used. The attacker can corrupt heap values leading for data integrity issues and availability impact. Remote code execution is unlikely to happen but not impossible.
Created rsyslog tracking bugs for this issue: Affects: fedora-all [bug 2082302]
*** Bug 2081091 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:4801 https://access.redhat.com/errata/RHSA-2022:4801
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:4795 https://access.redhat.com/errata/RHSA-2022:4795
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:4803 https://access.redhat.com/errata/RHSA-2022:4803
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:4800 https://access.redhat.com/errata/RHSA-2022:4800
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:4802 https://access.redhat.com/errata/RHSA-2022:4802
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:4799 https://access.redhat.com/errata/RHSA-2022:4799
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Extended Lifecycle Support Via RHSA-2022:4808 https://access.redhat.com/errata/RHSA-2022:4808
I believe this errata has an error in its package name: https://access.redhat.com/errata/RHSA-2022:4799 It mentions: x86_64 rsyslog-8.2102.0-7.el8_6.1.x86_64.rpm However, on my system after the update, I see: rsyslog-8.2102.0-7.el8.x86_64 the "_6.1" is not there. Therefore, it results in false positive in security tools such as Tenable Nessus as they are expecting rsyslog-8.2102.0-7.el8_6.1 instead of rsyslog-8.2102.0-7.el8.x86_64 Could the errata be updated?
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2022:4896 https://access.redhat.com/errata/RHSA-2022:4896
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2022:5439 https://access.redhat.com/errata/RHSA-2022:5439
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-24903