Headline
Debian Security Advisory 5369-1
Debian Linux Security Advisory 5369-1 - It was discovered that an integer overflow in the RFC3164 parser of syslog-ng, a system logging daemon, may result in denial of service via malformed syslog messages.
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5369-1 [email protected]://www.debian.org/security/ Moritz MuehlenhoffMarch 05, 2023 https://www.debian.org/security/faq- -------------------------------------------------------------------------Package : syslog-ngCVE ID : CVE-2022-38725It was discovered that an integer overflow in the RFC3164 parser ofsyslog-ng, a system logging daemon, may result in denial of servicevia malformed syslog messages.For the stable distribution (bullseye), this problem has been fixed inversion 3.28.1-2+deb11u1.We recommend that you upgrade your syslog-ng packages.For the detailed security status of syslog-ng please refer toits security tracker page at:https://security-tracker.debian.org/tracker/syslog-ngFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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X2eM-----END PGP SIGNATURE-----
Related news
Gentoo Linux Security Advisory 202305-09
Gentoo Linux Security Advisory 202305-9 - A denial of service vulnerability was discovered in rsyslog related to syslog input over the network. Versions less than 3.38.1 are affected.
CVE-2022-38725: The syslog-ng Archives
An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 are also affected.