Headline
RHSA-2022:4800: Red Hat Security Advisory: rsyslog security update
An update for rsyslog is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-24903: rsyslog: Heap-based overflow in TCP syslog server
Synopsis
Important: rsyslog security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for rsyslog is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format.
Security Fix(es):
- rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.2 x86_64
Fixes
- BZ - 2081353 - CVE-2022-24903 rsyslog: Heap-based overflow in TCP syslog server
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2
SRPM
rsyslog-8.1911.0-3.el8_2.1.src.rpm
SHA-256: 82f2e210f5f004cc794ff9b61e86638d62db04ae4ea617469400e56dd22f71b3
x86_64
rsyslog-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 16678c59ba54b338f5fdc9951ca90d1c7f78f1841ede1ef6810813f7bdabc506
rsyslog-crypto-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: bd0e0230d73fdf0efe69ab89f40a5b3cc0fa91b4a91d23214980877e7e8bc827
rsyslog-crypto-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 2b2e701a4b6430951a4ea5e5d5cdb4603c612c273ebbd2304844ab86dfbfad13
rsyslog-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0f4e5c43a487839b6e411edec0b73dc0df5b4c79a31be0ccd1fa465539282d6c
rsyslog-debugsource-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: f67d5a93bb7c2f6c123a0edba7ad297fceecfe519a1cce7dd331c436372b2c6e
rsyslog-doc-8.1911.0-3.el8_2.1.noarch.rpm
SHA-256: 0304fee042f738ceed4818f6be68d7f5b11e7e5d4fc20dfe6f4eb172085af331
rsyslog-elasticsearch-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 8dfaa6183f7d6e0f961b6e9434f633729ab80cbbdb5f3077335dd7d99abe50f0
rsyslog-elasticsearch-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 759f4cd314027e0e4b4baad43534ecf2b70b949fee1528ffe2cd3e8e351054c1
rsyslog-gnutls-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 5adbfc9071e8a4b33c3309635ba6e40f4d36b1137a629e818c5bc08f7464f68c
rsyslog-gnutls-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: d4b6a869ba09c27f3cdb42497ead3f29065697c3d5866c9c0b942ca4c24a8a2a
rsyslog-gssapi-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 1be0c1ffc473c1816f128154062b1bd14a9be9c1801def75062d97e49b03c0a5
rsyslog-gssapi-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 37d6b2c048df95844b95115a58ba07c2ce175891af2de7e570d19d424ed2ce98
rsyslog-kafka-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: ca9502ce505a71355776b85dbf902471a18ff6b764b0a6aa4c84a37a01e3fb09
rsyslog-kafka-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: df2eec36c2f7bdfce309a1adef9b9d6c00f0874dbffb08de73fc80acdfda2071
rsyslog-mmaudit-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 4d666f273fd261ac0dec49f4eaa6ac9d304836fb34dc6dc5f76514b5a37943b3
rsyslog-mmaudit-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: b0f5429da1e868601c4ab7dc957ad0f44421ccd172b73f87eaf4e315492976e8
rsyslog-mmjsonparse-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0057f20084a232aeaf4bea811e3d599249b8751413796d9a7c2cbac23e045301
rsyslog-mmjsonparse-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 70923a6226bc579b407a30f87ce3364a0f3ca2fc71fc573af87c098825382022
rsyslog-mmkubernetes-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 39bbd870ac8155bc932858347065d45aac62f5c1c585f3b11e75563a4154fff4
rsyslog-mmkubernetes-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 4b9e7acf83ee69672d0874b946b40e4356da3dfbbf8e89d356cddcaa8e9cc190
rsyslog-mmnormalize-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: cb2cf92b042a46fa4ddfc18f575069ec242c3d1b804e826472cca9938de59b4c
rsyslog-mmnormalize-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: ac6f2932f764062ecbc26f8256caeffacf8efc24c5a1a6b0165e89639990b928
rsyslog-mmsnmptrapd-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 3476d37fd8b187ba928f832172b65fbc421a637e71f3a96591bf07c94ed55298
rsyslog-mmsnmptrapd-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: f6ad4db5e47cee38a4e2b243380a68fb49bd0881f60d1a6ddfee946daa1ab607
rsyslog-mysql-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 2b07d56dc2ccd6e8995d3894071f0a9c9294e05db5db0ca1975ef3f207cc7602
rsyslog-mysql-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: b0c164830f0d7bada5351adf85f11305630b03b4ccb0488e64cbb7d06de48980
rsyslog-pgsql-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0533f3cbfbc9fc4d390a2d5101e5977143dcf2f7483c516520c3df930fbf11c8
rsyslog-pgsql-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 037c9005626bc52c62f2482ac05f5119a571af19cff9ddbf8c2428e9e86cb063
rsyslog-relp-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 727a8d7690d332aaa13deb2b80005597ba1ca2d4e42cf86de258434d974b6d3a
rsyslog-relp-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 1810ef61533caf1af06d2f88d56fc95700d3db82a57f1a72696027c09439be62
rsyslog-snmp-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: d04c35d5e28e1c3ffcea7e8ef4ea21b60419414ac58f9248b5dd3df0bfd8e6dc
rsyslog-snmp-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 7d24ce3e828d3112a819d601fe321ebcbb3b6c54c67294aaea123c4713dd0b3a
Red Hat Enterprise Linux Server - AUS 8.2
SRPM
rsyslog-8.1911.0-3.el8_2.1.src.rpm
SHA-256: 82f2e210f5f004cc794ff9b61e86638d62db04ae4ea617469400e56dd22f71b3
x86_64
rsyslog-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 16678c59ba54b338f5fdc9951ca90d1c7f78f1841ede1ef6810813f7bdabc506
rsyslog-crypto-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: bd0e0230d73fdf0efe69ab89f40a5b3cc0fa91b4a91d23214980877e7e8bc827
rsyslog-crypto-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 2b2e701a4b6430951a4ea5e5d5cdb4603c612c273ebbd2304844ab86dfbfad13
rsyslog-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0f4e5c43a487839b6e411edec0b73dc0df5b4c79a31be0ccd1fa465539282d6c
rsyslog-debugsource-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: f67d5a93bb7c2f6c123a0edba7ad297fceecfe519a1cce7dd331c436372b2c6e
rsyslog-doc-8.1911.0-3.el8_2.1.noarch.rpm
SHA-256: 0304fee042f738ceed4818f6be68d7f5b11e7e5d4fc20dfe6f4eb172085af331
rsyslog-elasticsearch-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 8dfaa6183f7d6e0f961b6e9434f633729ab80cbbdb5f3077335dd7d99abe50f0
rsyslog-elasticsearch-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 759f4cd314027e0e4b4baad43534ecf2b70b949fee1528ffe2cd3e8e351054c1
rsyslog-gnutls-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 5adbfc9071e8a4b33c3309635ba6e40f4d36b1137a629e818c5bc08f7464f68c
rsyslog-gnutls-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: d4b6a869ba09c27f3cdb42497ead3f29065697c3d5866c9c0b942ca4c24a8a2a
rsyslog-gssapi-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 1be0c1ffc473c1816f128154062b1bd14a9be9c1801def75062d97e49b03c0a5
rsyslog-gssapi-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 37d6b2c048df95844b95115a58ba07c2ce175891af2de7e570d19d424ed2ce98
rsyslog-kafka-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: ca9502ce505a71355776b85dbf902471a18ff6b764b0a6aa4c84a37a01e3fb09
rsyslog-kafka-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: df2eec36c2f7bdfce309a1adef9b9d6c00f0874dbffb08de73fc80acdfda2071
rsyslog-mmaudit-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 4d666f273fd261ac0dec49f4eaa6ac9d304836fb34dc6dc5f76514b5a37943b3
rsyslog-mmaudit-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: b0f5429da1e868601c4ab7dc957ad0f44421ccd172b73f87eaf4e315492976e8
rsyslog-mmjsonparse-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0057f20084a232aeaf4bea811e3d599249b8751413796d9a7c2cbac23e045301
rsyslog-mmjsonparse-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 70923a6226bc579b407a30f87ce3364a0f3ca2fc71fc573af87c098825382022
rsyslog-mmkubernetes-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 39bbd870ac8155bc932858347065d45aac62f5c1c585f3b11e75563a4154fff4
rsyslog-mmkubernetes-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 4b9e7acf83ee69672d0874b946b40e4356da3dfbbf8e89d356cddcaa8e9cc190
rsyslog-mmnormalize-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: cb2cf92b042a46fa4ddfc18f575069ec242c3d1b804e826472cca9938de59b4c
rsyslog-mmnormalize-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: ac6f2932f764062ecbc26f8256caeffacf8efc24c5a1a6b0165e89639990b928
rsyslog-mmsnmptrapd-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 3476d37fd8b187ba928f832172b65fbc421a637e71f3a96591bf07c94ed55298
rsyslog-mmsnmptrapd-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: f6ad4db5e47cee38a4e2b243380a68fb49bd0881f60d1a6ddfee946daa1ab607
rsyslog-mysql-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 2b07d56dc2ccd6e8995d3894071f0a9c9294e05db5db0ca1975ef3f207cc7602
rsyslog-mysql-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: b0c164830f0d7bada5351adf85f11305630b03b4ccb0488e64cbb7d06de48980
rsyslog-pgsql-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0533f3cbfbc9fc4d390a2d5101e5977143dcf2f7483c516520c3df930fbf11c8
rsyslog-pgsql-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 037c9005626bc52c62f2482ac05f5119a571af19cff9ddbf8c2428e9e86cb063
rsyslog-relp-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 727a8d7690d332aaa13deb2b80005597ba1ca2d4e42cf86de258434d974b6d3a
rsyslog-relp-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 1810ef61533caf1af06d2f88d56fc95700d3db82a57f1a72696027c09439be62
rsyslog-snmp-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: d04c35d5e28e1c3ffcea7e8ef4ea21b60419414ac58f9248b5dd3df0bfd8e6dc
rsyslog-snmp-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 7d24ce3e828d3112a819d601fe321ebcbb3b6c54c67294aaea123c4713dd0b3a
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2
SRPM
rsyslog-8.1911.0-3.el8_2.1.src.rpm
SHA-256: 82f2e210f5f004cc794ff9b61e86638d62db04ae4ea617469400e56dd22f71b3
s390x
rsyslog-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: edb232668f76652fa7be80dcf24fbeb87cdc7a7d8f8adcce9cf89ec58ee25099
rsyslog-crypto-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 10629a32daab19c7ecfbefb88fbaaee13ac1d73107dd687cb6376323e3956259
rsyslog-crypto-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 61e0ce78dd710d6630af0eb09faa313896eab988f98a81bcf8b0ee8f1af03770
rsyslog-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 0f6b50b0d094050178b6221547b9b1ae4161fd8f1a2d87073c68c9bd1887f62c
rsyslog-debugsource-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 4f23b0135b868617c6d3fe3e6617aa9c63536a8a3b3c062e45ee3c294c61b001
rsyslog-doc-8.1911.0-3.el8_2.1.noarch.rpm
SHA-256: 0304fee042f738ceed4818f6be68d7f5b11e7e5d4fc20dfe6f4eb172085af331
rsyslog-elasticsearch-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: b2fdf0836ca67e9fdafef0e2ce5a3b422381741b158ae2c3bde8ab65b7a5b05c
rsyslog-elasticsearch-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 8e1b55b5a621bdfc7b45b19504f6034d8bc2a2f7a9ffdf108e90a204db57a551
rsyslog-gnutls-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: f2f520697f8a763c015d44e41d47e69bcc80425475723937cd721df12d9c77f8
rsyslog-gnutls-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 0483207070a6bd2a2d2dd4e75727125c7303b85b18b632b5ff3aa1e598045d6c
rsyslog-gssapi-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 14f94fc144b010455143ad3f7a5faea25c3cbaff1e598930f7cacc3461007cd7
rsyslog-gssapi-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 9f0739b5030467d468cff8da459d597cc6b50911d25b22c05ebfaf758a9e11f2
rsyslog-kafka-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 45291cf1591b14b28ccd7fcb5b01bf2e5572a97ce4a190c0b50d1e22862f553a
rsyslog-kafka-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: cf7ce45193d49889218910393f7c9d8ada9340232070b5216929b8b5f1e71e9f
rsyslog-mmaudit-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 14e7f09f08ab421774027186967515b7642d4f63e5fbbdff2ab86cb9e3b71dd4
rsyslog-mmaudit-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: d111b62c6cb376213412d5fb2f070c9c59a90c0ecc68a952275b65d3ef3bcfe4
rsyslog-mmjsonparse-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: a885ea1fc476ff941e871b6e2e2e266cf3731277b3497a78427cf705178ad734
rsyslog-mmjsonparse-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 35006477cc91486e460bebc5d2ba72164598940eac29c0613936b33fc0dd06ad
rsyslog-mmkubernetes-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: b603830080cbeec2d50af73dd5cb1033e394fc4840872b661e7668d40f35f90a
rsyslog-mmkubernetes-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 2f461337a16603feee23e3719beecfaee4d85ef1e3ec7d82186c7b378326d90c
rsyslog-mmnormalize-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 80d8d1c606ebdd7465f7f27401f81097ab51ff0a0bff7ace218819cfe4956d74
rsyslog-mmnormalize-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: cfa7e60f3db672aea7aa5f6bccf7070c3fa052811543e0abc10b7de9a8246d08
rsyslog-mmsnmptrapd-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: a2f23a60a3c207435aee4e218ff3507cdf8c01f1a21a4e4c9eb6fa4f3efd2aec
rsyslog-mmsnmptrapd-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 2e6ebc902ce6023f0351c7de9d9f4209ba8e059f760c7d64cadbc0473b90326f
rsyslog-mysql-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: cc2be5ece2e60eef1c85dc88ab901b896350171ff52a987c6c78aed79a1182a9
rsyslog-mysql-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: d45aee2c79509fe8f1de6307f2be46fca3c026b1450d5d0592cfa9472c973183
rsyslog-pgsql-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 386ac56fa11a03d72cfd82375e25c3445a151356e6eed4cbf062b1707444be9a
rsyslog-pgsql-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 2ac3797d052331837b1621e0faabcbed2d1e6cc789eb3ed635cbbd96ef2174e4
rsyslog-relp-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 1336abc2cd8f1c7c0e2962cf09a0f6e04179e66216a544429d72dfd15a155ac9
rsyslog-relp-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: 0cfc94a9533b5c9c3cec1e7a3c38598bac10065b360668dc5a3d8e3fbc0786a7
rsyslog-snmp-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: d81c4ff7f44ef37881dbe0014137fa77a6dee009ed2ece5d3c4b6e882ba88da6
rsyslog-snmp-debuginfo-8.1911.0-3.el8_2.1.s390x.rpm
SHA-256: b474618b38e16cd3e434ff434d1691fa2d5e9d9df25c093f4390d2515a7696b6
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2
SRPM
rsyslog-8.1911.0-3.el8_2.1.src.rpm
SHA-256: 82f2e210f5f004cc794ff9b61e86638d62db04ae4ea617469400e56dd22f71b3
ppc64le
rsyslog-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 46c551c1d0f702bb19c7a91b7d5b0f9cc70e734602db754075fc8b555f393cf5
rsyslog-crypto-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 09c5616373b9e5225472befc4cc2cc23772751da3446d159a2231288a15e9314
rsyslog-crypto-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 861ba08ec4d9b88bf2087fb95be7d8af9b26dadeffcdd148c959378a2c6de97c
rsyslog-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: b9907342abb8e6b605fe676bf1322bf3fa29eabd061ce399e81d16cc355539f4
rsyslog-debugsource-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 3e345804f1700b3d5853dbbd5d04120ae377bd4f6b6b44cd7dcf474716851c2e
rsyslog-doc-8.1911.0-3.el8_2.1.noarch.rpm
SHA-256: 0304fee042f738ceed4818f6be68d7f5b11e7e5d4fc20dfe6f4eb172085af331
rsyslog-elasticsearch-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: cc96238474494df665f6bcf6fefd2256b7cba2974b3f7408d5fdd54ed4184643
rsyslog-elasticsearch-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: f41233bc280438875f379ec7824738633e7795008df1e995c94e4568b65e9f56
rsyslog-gnutls-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 449b308b347ede8d6743fdc892b99fb1328f4ea9c6b96f1c6ff27bb5230f0c4a
rsyslog-gnutls-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 326e2178a73adc217e6ed7d136823f8d64d52e8d284292f063e400d36652d1ac
rsyslog-gssapi-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 5558e6df64432c66dfdd97c649b037440142a2b6384800e6824ec056b42d384b
rsyslog-gssapi-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: d75a544aa172712bcbe1f443ef325f7e378040a65c324e8c1c0f20214ae33494
rsyslog-kafka-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: d74e6c52e2d1a2db1b271f7a0be6662f5634f8db4bbbb63c35efbca973588c90
rsyslog-kafka-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: bb8fd8b3f14f9223236bb24b38e19e6ae0856096d39630a09e685fa37ef97782
rsyslog-mmaudit-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: f4a029fa7c34568b251b2c4a8d2dfd0e09dd6574268e5f1e20b37999993abf3d
rsyslog-mmaudit-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: b6b008c84b2742921fc795a834704108d78565f2593b1e911fbb1ee33d5561a5
rsyslog-mmjsonparse-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 31ed6396767cabc10900b34287e7b1ca03c7f4cb1b6697b99c8d6bbbd3577e97
rsyslog-mmjsonparse-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 735a0d767a88a9816630ab342749eab1b059450c461b050e95769be1a6a98faa
rsyslog-mmkubernetes-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 9bb802136584e5e0151a3f0b16b63f232859b4b9b7363fdced599855e7487651
rsyslog-mmkubernetes-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: b6a16c8c29928b658b0b729df51b1dcff5fd4493f87e36d7b0f1c428a74001a8
rsyslog-mmnormalize-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 39b1d2fc42b2f6ab678a6a8f5f48d72f9faa7bfbed2fc7778a717b335ed5c7e5
rsyslog-mmnormalize-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 9b47e2a6d06a19471abaad388fd37fa88533ee82ff8610fef7abd4183a55f06b
rsyslog-mmsnmptrapd-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 9725ced27399f8020eff3d3cda9f6da9e3a85731003c1f808b3debb15f4de9d6
rsyslog-mmsnmptrapd-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: fdcd23d307504fd470a47d755621833e5c10b2df34f5a0f623e527fc46b0642e
rsyslog-mysql-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: ef2ee923813b8622dec11e56a5dd705c025d4951b771254f158def7d0a7f7e37
rsyslog-mysql-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: e3273a742896cd5d74966c5b201e482e71f9bcf91eb2e9bf730f53cf5429fefc
rsyslog-pgsql-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 5903ff533eb77192c997778037ac6b85694708446a9deb7f1e07a8f329a59024
rsyslog-pgsql-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 2f54f720d276acff7c4752a13c9925e601546e55e2b86c8c4992fca7c78001a7
rsyslog-relp-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: ef1692ea59371228dd9895ef8fb958811e9e2a1b3dbeb2c98f65c9c459ce3bf0
rsyslog-relp-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 05876d5526e1a2a180e0c80545bd89b3a9623844453adcebf15e8567a31e67a9
rsyslog-snmp-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 62f1d5e3ae8c2129f1558d3f0034387eb94d356b3438461573d1c7d9b12ac423
rsyslog-snmp-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 2a7fefd38b5b16c8d6f86d3b2d8abda96ab3b316bf229fd1bae893da3242c57e
Red Hat Enterprise Linux Server - TUS 8.2
SRPM
rsyslog-8.1911.0-3.el8_2.1.src.rpm
SHA-256: 82f2e210f5f004cc794ff9b61e86638d62db04ae4ea617469400e56dd22f71b3
x86_64
rsyslog-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 16678c59ba54b338f5fdc9951ca90d1c7f78f1841ede1ef6810813f7bdabc506
rsyslog-crypto-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: bd0e0230d73fdf0efe69ab89f40a5b3cc0fa91b4a91d23214980877e7e8bc827
rsyslog-crypto-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 2b2e701a4b6430951a4ea5e5d5cdb4603c612c273ebbd2304844ab86dfbfad13
rsyslog-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0f4e5c43a487839b6e411edec0b73dc0df5b4c79a31be0ccd1fa465539282d6c
rsyslog-debugsource-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: f67d5a93bb7c2f6c123a0edba7ad297fceecfe519a1cce7dd331c436372b2c6e
rsyslog-doc-8.1911.0-3.el8_2.1.noarch.rpm
SHA-256: 0304fee042f738ceed4818f6be68d7f5b11e7e5d4fc20dfe6f4eb172085af331
rsyslog-elasticsearch-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 8dfaa6183f7d6e0f961b6e9434f633729ab80cbbdb5f3077335dd7d99abe50f0
rsyslog-elasticsearch-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 759f4cd314027e0e4b4baad43534ecf2b70b949fee1528ffe2cd3e8e351054c1
rsyslog-gnutls-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 5adbfc9071e8a4b33c3309635ba6e40f4d36b1137a629e818c5bc08f7464f68c
rsyslog-gnutls-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: d4b6a869ba09c27f3cdb42497ead3f29065697c3d5866c9c0b942ca4c24a8a2a
rsyslog-gssapi-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 1be0c1ffc473c1816f128154062b1bd14a9be9c1801def75062d97e49b03c0a5
rsyslog-gssapi-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 37d6b2c048df95844b95115a58ba07c2ce175891af2de7e570d19d424ed2ce98
rsyslog-kafka-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: ca9502ce505a71355776b85dbf902471a18ff6b764b0a6aa4c84a37a01e3fb09
rsyslog-kafka-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: df2eec36c2f7bdfce309a1adef9b9d6c00f0874dbffb08de73fc80acdfda2071
rsyslog-mmaudit-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 4d666f273fd261ac0dec49f4eaa6ac9d304836fb34dc6dc5f76514b5a37943b3
rsyslog-mmaudit-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: b0f5429da1e868601c4ab7dc957ad0f44421ccd172b73f87eaf4e315492976e8
rsyslog-mmjsonparse-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0057f20084a232aeaf4bea811e3d599249b8751413796d9a7c2cbac23e045301
rsyslog-mmjsonparse-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 70923a6226bc579b407a30f87ce3364a0f3ca2fc71fc573af87c098825382022
rsyslog-mmkubernetes-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 39bbd870ac8155bc932858347065d45aac62f5c1c585f3b11e75563a4154fff4
rsyslog-mmkubernetes-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 4b9e7acf83ee69672d0874b946b40e4356da3dfbbf8e89d356cddcaa8e9cc190
rsyslog-mmnormalize-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: cb2cf92b042a46fa4ddfc18f575069ec242c3d1b804e826472cca9938de59b4c
rsyslog-mmnormalize-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: ac6f2932f764062ecbc26f8256caeffacf8efc24c5a1a6b0165e89639990b928
rsyslog-mmsnmptrapd-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 3476d37fd8b187ba928f832172b65fbc421a637e71f3a96591bf07c94ed55298
rsyslog-mmsnmptrapd-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: f6ad4db5e47cee38a4e2b243380a68fb49bd0881f60d1a6ddfee946daa1ab607
rsyslog-mysql-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 2b07d56dc2ccd6e8995d3894071f0a9c9294e05db5db0ca1975ef3f207cc7602
rsyslog-mysql-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: b0c164830f0d7bada5351adf85f11305630b03b4ccb0488e64cbb7d06de48980
rsyslog-pgsql-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0533f3cbfbc9fc4d390a2d5101e5977143dcf2f7483c516520c3df930fbf11c8
rsyslog-pgsql-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 037c9005626bc52c62f2482ac05f5119a571af19cff9ddbf8c2428e9e86cb063
rsyslog-relp-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 727a8d7690d332aaa13deb2b80005597ba1ca2d4e42cf86de258434d974b6d3a
rsyslog-relp-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 1810ef61533caf1af06d2f88d56fc95700d3db82a57f1a72696027c09439be62
rsyslog-snmp-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: d04c35d5e28e1c3ffcea7e8ef4ea21b60419414ac58f9248b5dd3df0bfd8e6dc
rsyslog-snmp-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 7d24ce3e828d3112a819d601fe321ebcbb3b6c54c67294aaea123c4713dd0b3a
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2
SRPM
rsyslog-8.1911.0-3.el8_2.1.src.rpm
SHA-256: 82f2e210f5f004cc794ff9b61e86638d62db04ae4ea617469400e56dd22f71b3
aarch64
rsyslog-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 66b65eee5ff03b55d29ee2164b7b10611d2888b9bea8f9b73f77245f8b01b4bf
rsyslog-crypto-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: a178ef948be506fd9abad81d349c1f3312b8064902bbf5892d98799bf4e8b3d1
rsyslog-crypto-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: b5104e8673d465116f2c6464a5f259e6f3fd4697b278e10f20d3c4cbcd6aa27e
rsyslog-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 19a9527685f994ac3e556ff90f5e531ad4603d9891d2e25600c39d21ac0c11bb
rsyslog-debugsource-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 79ec9ed3d020518ef9c49bc662bbeed1c3c1095253533e700096ed11b343d934
rsyslog-doc-8.1911.0-3.el8_2.1.noarch.rpm
SHA-256: 0304fee042f738ceed4818f6be68d7f5b11e7e5d4fc20dfe6f4eb172085af331
rsyslog-elasticsearch-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 1aeb9d16388df75777410248f2e39d979105b86113393e2f140bf1d52f10e672
rsyslog-elasticsearch-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 0e07c8789cac577e7526b596911173ad210f9b1394bf38e1d7a4d1021d205d4d
rsyslog-gnutls-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: e937a6871f64563b9f619c778c93486d66b8c7a667c9370601012be307232fe2
rsyslog-gnutls-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: b23b5bae73f9aeae6b215662505c5b4591a42be9500d2c31268ceaac391963df
rsyslog-gssapi-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: edba73c3f4f791cb52366825103918acc3a22519a680dac5c8ad62d66455deeb
rsyslog-gssapi-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 08dbe01b04cd6c792e3a4d7830678e173f23b7ad609ce6318d7da97d718fb011
rsyslog-kafka-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 6a6bf07ce0053fb26d1ccf2286c988e882b1b2641a90aedd1ad097b4bafcbd78
rsyslog-kafka-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 14944b2c39f65d94d4957c1b760c71957032a532de3238d857a9812ab36c05f4
rsyslog-mmaudit-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 9b8ef5652a0a71782fe94b6b935721496608b15b8be50a32ce570178792e33d8
rsyslog-mmaudit-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: a8fa010a45417fcf7936933556b60472f5f0ed8e78213c24d5b990a3938dc613
rsyslog-mmjsonparse-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: a81212118b87e4fa8c2b632014639962a9baee1e0a25930f3dd1c86d17b0744f
rsyslog-mmjsonparse-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 2e6dedfbed8c7edaf677377cac9bd71682d25b7cd8e9d760f5ad401b3b50a82b
rsyslog-mmkubernetes-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 716b00c3b745c10299b1053daa83896e48e91f7f2525fa5cecff7a3c6c17969c
rsyslog-mmkubernetes-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: ec4563bed16daf614112ade5dae9b8933f2c530b1c5ef7774f276a28ead795e9
rsyslog-mmnormalize-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: fe282e31516fedc22446ba2c7666c34b6e6dc1c30fe26a5c2811ccb6801e4c3b
rsyslog-mmnormalize-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 20940aa2a84a1d47cdf66a0fb83f4acc8ea3f960dae82046bed43738f2fdb9f3
rsyslog-mmsnmptrapd-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: ddd025a672076fe873f54bdd3bb3d3ab39368b6afd2863fa9d2eef5bd960a5f9
rsyslog-mmsnmptrapd-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 3b90fdebe3e11fc1e8d2014bb5afd8a7cf0842810f29da9ec1e027c0decdb120
rsyslog-mysql-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: b035ca4c8e26245a4ab283e3c113703a2b3ba8be1289181397d0c20b0831d6c9
rsyslog-mysql-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 711d8b03321fe196d8c9f2e611918f961f997fb942f5528abf38801b41cdbe25
rsyslog-pgsql-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 5a9f0bae23022ae311ffca27f0d6b1eaf420900235e42881c2b2f38933b9d3e8
rsyslog-pgsql-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 5340ea4c5a0d075cef57148426dbe3d05cc225fa0308b24f9d9fd70a07ac06f5
rsyslog-relp-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 9f3f0df9ea87e715aec7344fd7bf386c4e4e30f0f73c9d252d38e0876ebe0759
rsyslog-relp-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: 5be05a06398256491df86d99aae54240c666ad4ee7460c140dc02bcf54eb6f5e
rsyslog-snmp-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: ee6ea7a19c7b687755368cad4cb62eb0dbdc00ff33866a595f4c7f92f9909844
rsyslog-snmp-debuginfo-8.1911.0-3.el8_2.1.aarch64.rpm
SHA-256: a78b85267be45610fd04227f2e7c1880fc33fefcbe16ddd4abd9a62eec46b836
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
rsyslog-8.1911.0-3.el8_2.1.src.rpm
SHA-256: 82f2e210f5f004cc794ff9b61e86638d62db04ae4ea617469400e56dd22f71b3
ppc64le
rsyslog-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 46c551c1d0f702bb19c7a91b7d5b0f9cc70e734602db754075fc8b555f393cf5
rsyslog-crypto-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 09c5616373b9e5225472befc4cc2cc23772751da3446d159a2231288a15e9314
rsyslog-crypto-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 861ba08ec4d9b88bf2087fb95be7d8af9b26dadeffcdd148c959378a2c6de97c
rsyslog-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: b9907342abb8e6b605fe676bf1322bf3fa29eabd061ce399e81d16cc355539f4
rsyslog-debugsource-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 3e345804f1700b3d5853dbbd5d04120ae377bd4f6b6b44cd7dcf474716851c2e
rsyslog-doc-8.1911.0-3.el8_2.1.noarch.rpm
SHA-256: 0304fee042f738ceed4818f6be68d7f5b11e7e5d4fc20dfe6f4eb172085af331
rsyslog-elasticsearch-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: cc96238474494df665f6bcf6fefd2256b7cba2974b3f7408d5fdd54ed4184643
rsyslog-elasticsearch-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: f41233bc280438875f379ec7824738633e7795008df1e995c94e4568b65e9f56
rsyslog-gnutls-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 449b308b347ede8d6743fdc892b99fb1328f4ea9c6b96f1c6ff27bb5230f0c4a
rsyslog-gnutls-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 326e2178a73adc217e6ed7d136823f8d64d52e8d284292f063e400d36652d1ac
rsyslog-gssapi-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 5558e6df64432c66dfdd97c649b037440142a2b6384800e6824ec056b42d384b
rsyslog-gssapi-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: d75a544aa172712bcbe1f443ef325f7e378040a65c324e8c1c0f20214ae33494
rsyslog-kafka-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: d74e6c52e2d1a2db1b271f7a0be6662f5634f8db4bbbb63c35efbca973588c90
rsyslog-kafka-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: bb8fd8b3f14f9223236bb24b38e19e6ae0856096d39630a09e685fa37ef97782
rsyslog-mmaudit-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: f4a029fa7c34568b251b2c4a8d2dfd0e09dd6574268e5f1e20b37999993abf3d
rsyslog-mmaudit-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: b6b008c84b2742921fc795a834704108d78565f2593b1e911fbb1ee33d5561a5
rsyslog-mmjsonparse-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 31ed6396767cabc10900b34287e7b1ca03c7f4cb1b6697b99c8d6bbbd3577e97
rsyslog-mmjsonparse-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 735a0d767a88a9816630ab342749eab1b059450c461b050e95769be1a6a98faa
rsyslog-mmkubernetes-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 9bb802136584e5e0151a3f0b16b63f232859b4b9b7363fdced599855e7487651
rsyslog-mmkubernetes-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: b6a16c8c29928b658b0b729df51b1dcff5fd4493f87e36d7b0f1c428a74001a8
rsyslog-mmnormalize-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 39b1d2fc42b2f6ab678a6a8f5f48d72f9faa7bfbed2fc7778a717b335ed5c7e5
rsyslog-mmnormalize-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 9b47e2a6d06a19471abaad388fd37fa88533ee82ff8610fef7abd4183a55f06b
rsyslog-mmsnmptrapd-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 9725ced27399f8020eff3d3cda9f6da9e3a85731003c1f808b3debb15f4de9d6
rsyslog-mmsnmptrapd-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: fdcd23d307504fd470a47d755621833e5c10b2df34f5a0f623e527fc46b0642e
rsyslog-mysql-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: ef2ee923813b8622dec11e56a5dd705c025d4951b771254f158def7d0a7f7e37
rsyslog-mysql-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: e3273a742896cd5d74966c5b201e482e71f9bcf91eb2e9bf730f53cf5429fefc
rsyslog-pgsql-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 5903ff533eb77192c997778037ac6b85694708446a9deb7f1e07a8f329a59024
rsyslog-pgsql-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 2f54f720d276acff7c4752a13c9925e601546e55e2b86c8c4992fca7c78001a7
rsyslog-relp-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: ef1692ea59371228dd9895ef8fb958811e9e2a1b3dbeb2c98f65c9c459ce3bf0
rsyslog-relp-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 05876d5526e1a2a180e0c80545bd89b3a9623844453adcebf15e8567a31e67a9
rsyslog-snmp-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 62f1d5e3ae8c2129f1558d3f0034387eb94d356b3438461573d1c7d9b12ac423
rsyslog-snmp-debuginfo-8.1911.0-3.el8_2.1.ppc64le.rpm
SHA-256: 2a7fefd38b5b16c8d6f86d3b2d8abda96ab3b316bf229fd1bae893da3242c57e
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.2
SRPM
rsyslog-8.1911.0-3.el8_2.1.src.rpm
SHA-256: 82f2e210f5f004cc794ff9b61e86638d62db04ae4ea617469400e56dd22f71b3
x86_64
rsyslog-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 16678c59ba54b338f5fdc9951ca90d1c7f78f1841ede1ef6810813f7bdabc506
rsyslog-crypto-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: bd0e0230d73fdf0efe69ab89f40a5b3cc0fa91b4a91d23214980877e7e8bc827
rsyslog-crypto-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 2b2e701a4b6430951a4ea5e5d5cdb4603c612c273ebbd2304844ab86dfbfad13
rsyslog-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0f4e5c43a487839b6e411edec0b73dc0df5b4c79a31be0ccd1fa465539282d6c
rsyslog-debugsource-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: f67d5a93bb7c2f6c123a0edba7ad297fceecfe519a1cce7dd331c436372b2c6e
rsyslog-doc-8.1911.0-3.el8_2.1.noarch.rpm
SHA-256: 0304fee042f738ceed4818f6be68d7f5b11e7e5d4fc20dfe6f4eb172085af331
rsyslog-elasticsearch-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 8dfaa6183f7d6e0f961b6e9434f633729ab80cbbdb5f3077335dd7d99abe50f0
rsyslog-elasticsearch-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 759f4cd314027e0e4b4baad43534ecf2b70b949fee1528ffe2cd3e8e351054c1
rsyslog-gnutls-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 5adbfc9071e8a4b33c3309635ba6e40f4d36b1137a629e818c5bc08f7464f68c
rsyslog-gnutls-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: d4b6a869ba09c27f3cdb42497ead3f29065697c3d5866c9c0b942ca4c24a8a2a
rsyslog-gssapi-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 1be0c1ffc473c1816f128154062b1bd14a9be9c1801def75062d97e49b03c0a5
rsyslog-gssapi-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 37d6b2c048df95844b95115a58ba07c2ce175891af2de7e570d19d424ed2ce98
rsyslog-kafka-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: ca9502ce505a71355776b85dbf902471a18ff6b764b0a6aa4c84a37a01e3fb09
rsyslog-kafka-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: df2eec36c2f7bdfce309a1adef9b9d6c00f0874dbffb08de73fc80acdfda2071
rsyslog-mmaudit-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 4d666f273fd261ac0dec49f4eaa6ac9d304836fb34dc6dc5f76514b5a37943b3
rsyslog-mmaudit-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: b0f5429da1e868601c4ab7dc957ad0f44421ccd172b73f87eaf4e315492976e8
rsyslog-mmjsonparse-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0057f20084a232aeaf4bea811e3d599249b8751413796d9a7c2cbac23e045301
rsyslog-mmjsonparse-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 70923a6226bc579b407a30f87ce3364a0f3ca2fc71fc573af87c098825382022
rsyslog-mmkubernetes-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 39bbd870ac8155bc932858347065d45aac62f5c1c585f3b11e75563a4154fff4
rsyslog-mmkubernetes-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 4b9e7acf83ee69672d0874b946b40e4356da3dfbbf8e89d356cddcaa8e9cc190
rsyslog-mmnormalize-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: cb2cf92b042a46fa4ddfc18f575069ec242c3d1b804e826472cca9938de59b4c
rsyslog-mmnormalize-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: ac6f2932f764062ecbc26f8256caeffacf8efc24c5a1a6b0165e89639990b928
rsyslog-mmsnmptrapd-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 3476d37fd8b187ba928f832172b65fbc421a637e71f3a96591bf07c94ed55298
rsyslog-mmsnmptrapd-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: f6ad4db5e47cee38a4e2b243380a68fb49bd0881f60d1a6ddfee946daa1ab607
rsyslog-mysql-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 2b07d56dc2ccd6e8995d3894071f0a9c9294e05db5db0ca1975ef3f207cc7602
rsyslog-mysql-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: b0c164830f0d7bada5351adf85f11305630b03b4ccb0488e64cbb7d06de48980
rsyslog-pgsql-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 0533f3cbfbc9fc4d390a2d5101e5977143dcf2f7483c516520c3df930fbf11c8
rsyslog-pgsql-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 037c9005626bc52c62f2482ac05f5119a571af19cff9ddbf8c2428e9e86cb063
rsyslog-relp-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 727a8d7690d332aaa13deb2b80005597ba1ca2d4e42cf86de258434d974b6d3a
rsyslog-relp-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 1810ef61533caf1af06d2f88d56fc95700d3db82a57f1a72696027c09439be62
rsyslog-snmp-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: d04c35d5e28e1c3ffcea7e8ef4ea21b60419414ac58f9248b5dd3df0bfd8e6dc
rsyslog-snmp-debuginfo-8.1911.0-3.el8_2.1.x86_64.rpm
SHA-256: 7d24ce3e828d3112a819d601fe321ebcbb3b6c54c67294aaea123c4713dd0b3a
Related news
Gentoo Linux Security Advisory 202408-28 - A vulnerability has been discovered in rsyslog, which could possibly lead to remote code execution. Versions greater than or equal to 8.2206.0 are affected.
IBM Security Guardium 11.3 could allow an authenticated user to cause a denial of service due to improper input validation. IBM X-Force ID: 240903.
Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...
Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
ISOS firmwares from versions 1.81 to 2.00 contain hardcoded credentials from embedded StreamX installer that integrators are not forced to change.
Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.
Red Hat Security Advisory 2022-5439-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow, privilege escalation, and use-after-free vulnerabilities.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-25032: zlib: A flaw found in zlib when compressing (not decompressing) certain inputs * CVE-2022-1271: gzip: arbitrary-file-write vulnerability * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2...
Red Hat Security Advisory 2022-4896-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow, out of bounds write, and use-after-free vulnerabilities.
An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-25032: zlib: A flaw found in zlib when compressing (not decompressing) certain inputs * CVE-2021-4028: kernel: use-after-free in RDMA listen() * CVE-2021-4083: kernel: fget: check that the fd still exists after getting a ref to it * CVE-2022-0778: openssl:...
Red Hat Security Advisory 2022-4808-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. The rsyslog7 packages provide an enhanced, multi-threaded syslog daemon. It supports on-demand disk buffering, reliable syslog over TCP, SSL, TLS and RELP, writing to databases, email alerting, fully configurable output formats, the ability to filter on any part of the syslog message, on-the-wire message compression, and the ability to convert text files to syslog. Issues addressed include a heap overflow vulnerability.
Red Hat Security Advisory 2022-4795-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Issues addressed include a heap overflow vulnerability.
Red Hat Security Advisory 2022-4803-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Issues addressed include a heap overflow vulnerability.
Red Hat Security Advisory 2022-4801-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Issues addressed include a heap overflow vulnerability.
An update for rsyslog is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24903: rsyslog: Heap-based overflow in TCP syslog server
An update for rsyslog is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24903: rsyslog: Heap-based overflow in TCP syslog server
An update for rsyslog is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24903: rsyslog: Heap-based overflow in TCP syslog server
An update for rsyslog is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24903: rsyslog: Heap-based overflow in TCP syslog server
An update for rsyslog is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24903: rsyslog: Heap-based overflow in TCP syslog server
Ubuntu Security Notice 5404-2 - USN-5404-1 addressed a vulnerability in Rsyslog. This update provides the corresponding update for Ubuntu 16.04 ESM. Pieter Agten discovered that Rsyslog incorrectly handled certain requests. An attacker could possibly use this issue to cause a crash.
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. ...
Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.