ELSA-2022-4799

ELSA-2022-4799 - rsyslog security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-05-30

Description


[8.2102.0-7.1]
- Address CVE-2022-24903, Heap-based overflow in TCP syslog server
resolves: rhbz#2081400


Related CVEs


CVE-2022-24903

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 8 (aarch64) rsyslog-8.2102.0-7.el8_6.1.src.rpm154a66f0ec745517b64d8118eead0907-
rsyslog-8.2102.0-7.el8_6.1.aarch64.rpmf2863f0ecc263dd7c69ab0e700445073-
rsyslog-crypto-8.2102.0-7.el8_6.1.aarch64.rpm7379b22d5479a82b99316b38de167f7b-
rsyslog-doc-8.2102.0-7.el8_6.1.noarch.rpm32bd2aff290d05206d976b2cef0e2fb1-
rsyslog-elasticsearch-8.2102.0-7.el8_6.1.aarch64.rpma20359a06d1316b5b7e3a8bbff82edce-
rsyslog-gnutls-8.2102.0-7.el8_6.1.aarch64.rpmb2db0bbb16ae0349381755cd6c20d9ae-
rsyslog-gssapi-8.2102.0-7.el8_6.1.aarch64.rpm19e072e5e15fd5e0dcac0ca60f5af4bd-
rsyslog-kafka-8.2102.0-7.el8_6.1.aarch64.rpmabccc809568406314616c571fd947adb-
rsyslog-mmaudit-8.2102.0-7.el8_6.1.aarch64.rpma251f61d672662a59ffa74556d174e88-
rsyslog-mmfields-8.2102.0-7.el8_6.1.aarch64.rpmebce72cbd373df3b9cc1be4f51948de9-
rsyslog-mmjsonparse-8.2102.0-7.el8_6.1.aarch64.rpm1c349c81112ae31d3030b9616629e05d-
rsyslog-mmkubernetes-8.2102.0-7.el8_6.1.aarch64.rpm03ce6002c9f5b8941f9f8d72b4c4928c-
rsyslog-mmnormalize-8.2102.0-7.el8_6.1.aarch64.rpmc318a8909853557a8ab1d246087d96d0-
rsyslog-mmsnmptrapd-8.2102.0-7.el8_6.1.aarch64.rpm70796e09e7b865818e37451237382d61-
rsyslog-mysql-8.2102.0-7.el8_6.1.aarch64.rpmff831be2858a286dba2a8c1c301d5007-
rsyslog-omamqp1-8.2102.0-7.el8_6.1.aarch64.rpm8a1fdd4268e63cd331813e42a7ec71e2-
rsyslog-openssl-8.2102.0-7.el8_6.1.aarch64.rpma93e00987521823b4efe8eb563d8dd0a-
rsyslog-pgsql-8.2102.0-7.el8_6.1.aarch64.rpme93e116297734f50ce4c05fb1b735015-
rsyslog-relp-8.2102.0-7.el8_6.1.aarch64.rpm85d85c81512c747ed2dda8a925f70fa5-
rsyslog-snmp-8.2102.0-7.el8_6.1.aarch64.rpm12757b89cf2f2ac0577d2033461df698-
rsyslog-udpspoof-8.2102.0-7.el8_6.1.aarch64.rpm7f46cdb65dd6152e1a2edfbbff4c0ceb-
Oracle Linux 8 (x86_64) rsyslog-8.2102.0-7.el8_6.1.src.rpm154a66f0ec745517b64d8118eead0907-
rsyslog-8.2102.0-7.el8_6.1.x86_64.rpm557f4d6eec6237e4139e81dad2158007-
rsyslog-crypto-8.2102.0-7.el8_6.1.x86_64.rpmc836ce9410c2ef791b801aa47df5003c-
rsyslog-doc-8.2102.0-7.el8_6.1.noarch.rpm32bd2aff290d05206d976b2cef0e2fb1-
rsyslog-elasticsearch-8.2102.0-7.el8_6.1.x86_64.rpmb5d5ea1d64d4ba3f577a86c871c25d55-
rsyslog-gnutls-8.2102.0-7.el8_6.1.x86_64.rpm2f7cfeb0e851b290121fcc2a86b7f658-
rsyslog-gssapi-8.2102.0-7.el8_6.1.x86_64.rpm65d495ff692539679cf75e74a3643274-
rsyslog-kafka-8.2102.0-7.el8_6.1.x86_64.rpm29ef0c356d5cbd6b6a1a055160c9afb4-
rsyslog-mmaudit-8.2102.0-7.el8_6.1.x86_64.rpm38ac3d06f8ceba9df795d2608714e441-
rsyslog-mmfields-8.2102.0-7.el8_6.1.x86_64.rpm45306baea4280fc939e43c524a49054b-
rsyslog-mmjsonparse-8.2102.0-7.el8_6.1.x86_64.rpm79ea5617abcfbe7b96a63147761c5eeb-
rsyslog-mmkubernetes-8.2102.0-7.el8_6.1.x86_64.rpm8e55c1f56a8773e3422e39463b0eda49-
rsyslog-mmnormalize-8.2102.0-7.el8_6.1.x86_64.rpm0b1c3d77194f98ec76b5e5aecffc60ca-
rsyslog-mmsnmptrapd-8.2102.0-7.el8_6.1.x86_64.rpmc3976056da99a3ca6880f33df8822a26-
rsyslog-mysql-8.2102.0-7.el8_6.1.x86_64.rpmed14a5e97fc8e2b1d30fbcb2bc62ca8f-
rsyslog-omamqp1-8.2102.0-7.el8_6.1.x86_64.rpm16631f16c76344fd30a4cd3fb1783495-
rsyslog-openssl-8.2102.0-7.el8_6.1.x86_64.rpm6cef63c98448d878c23e0155af14f998-
rsyslog-pgsql-8.2102.0-7.el8_6.1.x86_64.rpm67b5c6cb7f46d8387758d41138a964bb-
rsyslog-relp-8.2102.0-7.el8_6.1.x86_64.rpmde1b9b80da2657b34aeeb7289cdf55d0-
rsyslog-snmp-8.2102.0-7.el8_6.1.x86_64.rpmaf80a919482f6e2e4f44f66b1a330522-
rsyslog-udpspoof-8.2102.0-7.el8_6.1.x86_64.rpmd3fefcc18811b4a358787323c12f3883-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete